Sciweavers

674 search results - page 115 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
SASN
2006
ACM
14 years 3 months ago
RANBAR: RANSAC-based resilient aggregation in sensor networks
We present a novel outlier elimination technique designed for sensor networks. This technique is called RANBAR and it is based on the RANSAC (RANdom SAmple Consensus) paradigm, wh...
Levente Buttyán, Péter Schaffer, Ist...
ICSOC
2007
Springer
14 years 3 months ago
Architectural Decisions and Patterns for Transactional Workflows in SOA
Abstract. An important architectural style for constructing enterprise applications is to use transactional workflows in SOA. In this setting, workflow activities invoke distribute...
Olaf Zimmermann, Jonas Grundler, Stefan Tai, Frank...
PAMI
2006
145views more  PAMI 2006»
13 years 9 months ago
Reflectance Sharing: Predicting Appearance from a Sparse Set of Images of a Known Shape
Three-dimensional appearance models consisting of spatially varying reflectance functions defined on a known shape can be used in analysis-by-synthesis approaches to a number of vi...
Todd Zickler, Ravi Ramamoorthi, Sebastian Enrique,...
PROMISE
2010
13 years 3 months ago
The role of the measure of functional complexity in effort estimation
Background. Currently there are several definitions of measures that should represent the size of software functional requirements. These measures have gained a quite relevant rol...
Luigi Lavazza, Gabriela Robiolo
OOPSLA
1999
Springer
14 years 1 months ago
Age-Based Garbage Collection
Modern generational garbage collectors look for garbage among the young objects, because they have high mortality; however, these objects include the very youngest objects, which ...
Darko Stefanovic, Kathryn S. McKinley, J. Eliot B....