Sciweavers

674 search results - page 85 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
SERP
2003
13 years 11 months ago
A Process for BDI Agent-Based Software Construction
Agent-based programming comes us as a next generation programming paradigm. However, we have not been ready yet to fully use it without having sound and concrete software engineer...
Chang-Hyun Jo, Jeffery M. Einhorn
CTRSA
2006
Springer
129views Cryptology» more  CTRSA 2006»
14 years 1 months ago
An Optimal Non-interactive Message Authentication Protocol
Vaudenay recently proposed a message authentication protocol which is interactive and based on short authenticated strings (SAS). We study here SASbased non-interactive message aut...
Sylvain Pasini, Serge Vaudenay
BMCBI
2006
121views more  BMCBI 2006»
13 years 10 months ago
Splice site identification using probabilistic parameters and SVM classification
Background: Recent advances and automation in DNA sequencing technology has created a vast amount of DNA sequence data. This increasing growth of sequence data demands better and ...
A. K. M. A. Baten, Bill C. H. Chang, Saman K. Halg...
ECOOPW
1997
Springer
14 years 2 months ago
The Object Model for a Product Based Development Process
The traditional workflow process model is typically illustrated with a graph of activities, tasks, deliverables and techniques. From an object-oriented perspective, every identifi...
Pavel Hruby
CORR
2006
Springer
124views Education» more  CORR 2006»
13 years 10 months ago
Next Generation Language Resources using GRID
This paper presents a case study concerning the challenges and requirements posed by next generation language resources, realized as an overall model of open, distributed and coll...
Federico Calzolari, Eva Sassolini, Manuela Sassi, ...