Sciweavers

4731 search results - page 40 / 947
» Securing Interactive Programs
Sort
View
SOCO
2009
Springer
14 years 3 months ago
Specifying and Composing Non-functional Requirements in Model-Based Development
Abstract. Non-functional requirements encompass important design concerns such as schedulability, security, and communication constraints. In model-based development they non-local...
Ethan K. Jackson, Dirk Seifert, Markus Dahlweid, T...
AVSS
2005
IEEE
14 years 2 months ago
VidMAP: video monitoring of activity with Prolog
This paper describes the architecture of a visual surveillance system that combines real time computer vision algorithms with logic programming to represent and recognize activiti...
Vinay D. Shet, David Harwood, Larry S. Davis
WORDS
2003
IEEE
14 years 2 months ago
Event-Driven Support of Real-Time Sentient Objects
The emergence of applications operating independently of direct human control is inevitable. Research on high-level models for this class of applications— e.g. on autonomous age...
Paulo Veríssimo, Antonio Casimiro
IFIP
2003
Springer
14 years 1 months ago
On Demand Network Level Service Deployment in Ad Hoc Networks
Many network level services such as routing, auto-addressing and, security have been proposed for ad hoc networks. Each has characteristics that may cause it to outperform similar ...
Daniel Prince, Andrew Scott, W. D. Shepherd
SIGSOFT
2009
ACM
14 years 9 months ago
Automated security testing of web widget interactions
Cor-Paul Bezemer, Ali Mesbah, Arie van Deursen