Sciweavers

2624 search results - page 44 / 525
» The 2LIP model and its implementations
Sort
View
ICDCS
2007
IEEE
14 years 4 months ago
Testing Security Properties of Protocol Implementations - a Machine Learning Based Approach
Security and reliability of network protocol implementations are essential for communication services. Most of the approaches for verifying security and reliability, such as forma...
Guoqiang Shu, David Lee
ECOOP
1999
Springer
14 years 1 months ago
Synthesizing Objects
This paper argues that the current OO technology does not support reuse and configurability in an effective way. This problem can be addressed by augmenting OO analysis and design ...
Krzysztof Czarnecki, Ulrich W. Eisenecker
IEEEIAS
2009
IEEE
14 years 4 months ago
Organizational Barriers to the Implementation of Security Engineering
: The link between security engineering and systems engineering exists at the earliest stage of systems development, and, as a whole, there is sufficient evidence to suggest the di...
Bryan Stewart Cline
GW
2005
Springer
103views Biometrics» more  GW 2005»
14 years 3 months ago
Implementing Expressive Gesture Synthesis for Embodied Conversational Agents
We aim at creating an expressive Embodied Conversational Agent (ECA) and address the problem of synthesizing expressive agent gestures. In our previous work, we have described the ...
Björn Hartmann, Maurizio Mancini, Catherine P...
DAGSTUHL
2009
13 years 10 months ago
Using Architecture Models to Support the Generation and Operation of Component-Based Adaptive Systems
Modelling architectural information is particularly important because of the acknowledged crucial role of software architecture in raising the level of abstraction during developme...
Nelly Bencomo, Gordon S. Blair