Sciweavers

674 search results - page 109 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
GEOS
2007
Springer
14 years 3 months ago
Modeling Spatio-temporal Network Computations: A Summary of Results
Spatio-temporal network is defined by a set of nodes, and a set of edges, where the properties of nodes and edges may vary over time. Such networks are encountered in a variety of...
Betsy George, Shashi Shekhar
KDD
2004
ACM
213views Data Mining» more  KDD 2004»
14 years 2 months ago
Analytical view of business data
This paper describes a logical extension to Microsoft Business Framework (MBF) called Analytical View (AV). AV consists of three components: Model Service for design time, Busines...
Adam Yeh, Jonathan Tang, Youxuan Jin, Sam Skrivan
HOTOS
2007
IEEE
14 years 27 days ago
Processor Hardware Counter Statistics as a First-Class System Resource
Today's processors provide a rich source of statistical information on program execution characteristics through hardware counters. However, traditionally, operating system (...
Xiao Zhang, Sandhya Dwarkadas, Girts Folkmanis, Ka...
ICC
2007
IEEE
126views Communications» more  ICC 2007»
14 years 3 months ago
Responsiveness on the Interactive Grid
The Grid vision promises the secure and dynamic sharing of heterogeneous resources across the Internet. To date the emphasis has been on supercomputing scenarios where a relatively...
Colin Allison, Stuart D. J. Purdie, Alan Miller
ICCV
2003
IEEE
14 years 2 months ago
Meshfree Particle Method
Many of the computer vision algorithms have been posed in various forms of differential equations, derived from minimization of specific energy functionals, and the finite eleme...
Huafeng Liu, Pengcheng Shi