Sciweavers

6978 search results - page 72 / 1396
» Reframing Requirements Analysis
Sort
View
SIGSOFT
2010
ACM
13 years 8 months ago
Realizability analysis for message-based interactions using shared-state projections
The global interaction behavior in message-based systems can be specified as a finite-state machine defining acceptable sequences of messages exchanged by a group of peers. Realiz...
Sylvain Hallé, Tevfik Bultan
COMPSAC
2010
IEEE
13 years 7 months ago
Security in Context: Analysis and Refinement of Software Architectures
Security analysis methods can provide correct yet meaningless results if the assumptions underlying the model do not conform to reality. We present an approach to analyze the secur...
Thomas Heyman, Riccardo Scandariato, Wouter Joosen
JDCTA
2010
113views more  JDCTA 2010»
13 years 5 months ago
A Watermarking Algorithm Based on Block Energy Analysis of Wavelet Transform's Coefficients and Lorenz Chaotic Attractor
Perceptual transparency and robustness are conflicting requirements. To ensure the security of the watermarkhow to choose the embedding position and intensity is a difficult probl...
Xuelong Hu, Wei Tian, Yongai Zheng
ISBI
2011
IEEE
13 years 1 months ago
Automatic mask generation using independent component analysis in dynamic contrast enhanced-MRI
Studying image intensity change in each pixel in dynamic contrast enhanced (DCE)-MRI data enables differentiation of different tissue types based on their difference in contrast u...
Hatef Mehrabian, Ian Pang, Chaitanya Chandrana, Ra...
ICCV
2011
IEEE
12 years 10 months ago
Data-driven Crowd Analysis in Videos
In this work we present a new crowd analysis algorithm powered by behavior priors that are learned on a large database of crowd videos gathered from the Internet. The algorithm wo...
Mikel Rodriguez, Josef Sivic, Ivan Laptev, Jean-Yv...