Sciweavers

674 search results - page 82 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
GEOS
2007
Springer
14 years 4 months ago
Supporting Complex Thematic, Spatial and Temporal Queries over Semantic Web Data
Spatial and temporal data are critical components in many applications. This is especially true in analytical domains such as national security and criminal investigation. Often, t...
Matthew Perry, Amit P. Sheth, Farshad Hakimpour, P...
IROS
2009
IEEE
230views Robotics» more  IROS 2009»
14 years 4 months ago
Stability and robustness analysis tools for marine robot localization and SLAM applications
— Our aim is to explore the fundamental stability issues of a robotic vehicle carrying out localization, mapping, and feedback control in a perturbation-filled environment. Moti...
Brendan Englot, Franz Hover
ECLIPSE
2004
ACM
14 years 3 months ago
FeaturePlugin: feature modeling plug-in for Eclipse
Feature modeling is a key technique used in product-line development to model commonalities and variabilities of productline members. In this paper, we present FeaturePlugin, a fe...
Michal Antkiewicz, Krzysztof Czarnecki
RTSS
2009
IEEE
14 years 4 months ago
Cross-Layer Analysis of the End-to-End Delay Distribution in Wireless Sensor Networks
—Emerging applications of wireless sensor networks (WSNs) require real-time quality of service (QoS) guarantees to be provided by the network. However, designing real-time schedu...
Yunbo Wang, Mehmet C. Vuran, Steve Goddard
SOSE
2008
IEEE
14 years 4 months ago
Ontology for Service Oriented Testing of Web Services
This paper presents a service oriented architecture for testing Web Services. In this architecture, various parties interoperate with each other to complete testing tasks through ...
Yufeng Zhang, Hong Zhu