Sciweavers

1792 search results - page 17 / 359
» Requirements Capture with RCAT
Sort
View
COMPSAC
2006
IEEE
15 years 9 months ago
An Aspect-Oriented Approach to Security Requirements Analysis
This paper presents an aspect-oriented approach to integrated elicitation of functional and security requirements based on use case-driven development. We identify security threat...
Dianxiang Xu, Vivek Goel, Kendall E. Nygard
ACSAC
1999
IEEE
15 years 7 months ago
Using Abuse Case Models for Security Requirements Analysis
The relationships between the work products of a security engineering process can be hard to understand, even for persons with a strong technical background but little knowledge o...
John P. McDermott, Chris Fox
CVPR
2007
IEEE
16 years 5 months ago
Real-time Gesture Recognition with Minimal Training Requirements and On-line Learning
In this paper, we introduce the semantic network model (SNM), a generalization of the hidden Markov model (HMM) that uses factorization of state transition probabilities to reduce...
Stjepan Rajko, Gang Qian, Todd Ingalls, Jodi James
LOCA
2005
Springer
15 years 9 months ago
Issues and Requirements for Bayesian Approaches in Context Aware Systems
Research in advanced context-aware systems has clearly shown a need to capture the inherent uncertainty in the physical world, especially in human behavior. Modelling approaches th...
Michael Angermann, Patrick Robertson, Thomas Stran...
SPLC
2010
15 years 1 months ago
Configuring Software Product Line Feature Models Based on Stakeholders' Soft and Hard Requirements
Abstract. Feature modeling is a technique for capturing commonality and variability. Feature models symbolize a representation of the possible application configuration space, and ...
Ebrahim Bagheri, Tommaso Di Noia, Azzurra Ragone, ...