Sciweavers

674 search results - page 88 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
WSC
1998
13 years 11 months ago
Interference Radius in PCS Radio Resource Management Simulations
Simulation is widely used for performance analysis of Personal Communication Systems due to their inherent complexity. However, resource demands (cpu-time and memory requirements)...
Michael Liljenstam, Rassul Ayani
AUSDM
2008
Springer
212views Data Mining» more  AUSDM 2008»
14 years 4 days ago
Clustering and Classification of Maintenance Logs using Text Data Mining
Spreadsheets applications allow data to be stored with low development overheads, but also with low data quality. Reporting on data from such sources is difficult using traditiona...
Brett Edwards, Michael Zatorsky, Richi Nayak
ISCIS
2004
Springer
14 years 3 months ago
Semi-formal and Formal Models Applied to Flexible Manufacturing Systems
Abstract. Flexible Manufacturing Systems (FMSs) are adopted to process different goods in different mix ratios allowing firms to react quickly and efficiently to changes in produ...
Andrea Matta, Carlo A. Furia, Matteo Rossi
DICTA
2007
13 years 11 months ago
Simplex Optimisation Initialized by Gaussian Mixture for Active Appearance Models
Active appearance model efficiently aligns objects which are previously modelized in images. We use it for Human Machine Interface (face gesture analysis, lips reading) to modeli...
Yasser Aidarous, Sylvain Le Gallou, Renaud S&eacut...
JOT
2006
113views more  JOT 2006»
13 years 10 months ago
Constraint Validation in Model Compilers
Model transformation has become one of the most focused research field, motivated by for instance the OMG's Model-Driven Architecture (MDA). Metamodeling is a central techniq...
László Lengyel, Tihamer Levendovszky...