Sciweavers

517 search results - page 66 / 104
» Specification transformers: a predicate transformer approach...
Sort
View
CASE
2011
102views more  CASE 2011»
12 years 8 months ago
Towards an automated verification process for industrial safety applications
— Legacy systems that do not conform to the norms and regulations imposed by recent safety standards have to be upgraded to meet safety requirements. In this paper, we describe a...
Kleanthis Thramboulidis, Doaa Soliman, Georg Frey
TCOM
2010
195views more  TCOM 2010»
13 years 3 months ago
Coherent and Differential Space-Time Shift Keying: A Dispersion Matrix Approach
Abstract--Motivated by the recent concept of Spatial Modulation (SM), we propose a novel Space-Time Shift Keying (STSK) modulation scheme for Multiple-Input Multiple-Output (MIMO) ...
Shinya Sugiura, Sheng Chen, Lajos Hanzo
MODELLIERUNG
2008
13 years 10 months ago
Modelling Security Goals in Business Processes
: Various types of security goals, such as authentication or confidentiality, can be defined as policies for process-aware information systems, typically in a manual fashion. There...
Christian Wolter, Michael Menzel, Christoph Meinel
SPLC
2008
13 years 10 months ago
A Marriage of MDD and Early Aspects in Software Product Line Development
Model-driven development (MDD) shifts the development focus from code to models, allowing automatic or assisted transformations that are able to generate more refined, detailed or...
Thaís Vasconcelos Batista, M. Cecilia Basta...
CVPR
2007
IEEE
14 years 10 months ago
Robust Click-Point Linking: Matching Visually Dissimilar Local Regions
This paper presents robust click-point linking: a novel localized registration framework that allows users to interactively prescribe where the accuracy has to be high. By emphasi...
Kazunori Okada, Xiaolei Huang