Sciweavers

1487 search results - page 163 / 298
» Two Kinds of Metonymy
Sort
View
ESEM
2009
ACM
14 years 3 months ago
Progress report on the experimental evaluation of security inspection guidance
Although security inspections have proven to be a very efficient means for assuring software security early in the software development lifecycle, they are not used extensively be...
Frank Elberzhager, Marek Jawurek, Christian Jung, ...
BDIM
2008
IEEE
205views Business» more  BDIM 2008»
14 years 3 months ago
Mining semantic relations using NetFlow
—Knowing the dependencies among computing assets and services provides insights into the computing and business landscape, therefore, facilitating low-risk timely changes in supp...
Alexandru Caracas, Andreas Kind, Dieter Gantenbein...
CDC
2008
IEEE
202views Control Systems» more  CDC 2008»
14 years 3 months ago
Integrating human and robot decision-making dynamics with feedback: Models and convergence analysis
— Leveraging research by psychologists on human decision-making, we present a human-robot decision-making problem associated with a complex task and study the corresponding joint...
Ming Cao, Andrew Reed Stewart, Naomi Ehrich Leonar...
CW
2008
IEEE
14 years 3 months ago
Interactive Animation of Virtual Characters: Application to Virtual Kung-Fu Fighting
This paper aims at proposing a framework for animating virtual humans that can efficiently interact with real users in virtual reality (VR). If the user’s order can be modeled ...
Nicolas Pronost, Franck Multon, Qilei Li, Weidong ...
EDOC
2008
IEEE
14 years 3 months ago
Using Enterprise Architecture Models for System Quality Analysis
Enterprise Architecture is a model-based approach to business-oriented IT management. To promote good IT decision making, an Enterprise Architecture framework needs to explicate w...
Per Närman, Marten Schönherr, Pontus Joh...