Sciweavers

1792 search results - page 17 / 359
» Requirements Capture with RCAT
Sort
View
COMPSAC
2006
IEEE
14 years 2 months ago
An Aspect-Oriented Approach to Security Requirements Analysis
This paper presents an aspect-oriented approach to integrated elicitation of functional and security requirements based on use case-driven development. We identify security threat...
Dianxiang Xu, Vivek Goel, Kendall E. Nygard
ACSAC
1999
IEEE
14 years 23 days ago
Using Abuse Case Models for Security Requirements Analysis
The relationships between the work products of a security engineering process can be hard to understand, even for persons with a strong technical background but little knowledge o...
John P. McDermott, Chris Fox
CVPR
2007
IEEE
14 years 10 months ago
Real-time Gesture Recognition with Minimal Training Requirements and On-line Learning
In this paper, we introduce the semantic network model (SNM), a generalization of the hidden Markov model (HMM) that uses factorization of state transition probabilities to reduce...
Stjepan Rajko, Gang Qian, Todd Ingalls, Jodi James
LOCA
2005
Springer
14 years 1 months ago
Issues and Requirements for Bayesian Approaches in Context Aware Systems
Research in advanced context-aware systems has clearly shown a need to capture the inherent uncertainty in the physical world, especially in human behavior. Modelling approaches th...
Michael Angermann, Patrick Robertson, Thomas Stran...
SPLC
2010
13 years 6 months ago
Configuring Software Product Line Feature Models Based on Stakeholders' Soft and Hard Requirements
Abstract. Feature modeling is a technique for capturing commonality and variability. Feature models symbolize a representation of the possible application configuration space, and ...
Ebrahim Bagheri, Tommaso Di Noia, Azzurra Ragone, ...