Sciweavers

674 search results - page 94 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
TAOSD
2010
13 years 7 months ago
A Graph-Based Aspect Interference Detection Approach for UML-Based Aspect-Oriented Models
Abstract. Aspect Oriented Modeling (AOM) techniques facilitate separate modeling of concerns and allow for a more flexible composition of these than traditional modeling technique...
Selim Ciraci, Wilke Havinga, Mehmet Aksit, Christo...
ISOLA
2010
Springer
13 years 7 months ago
LivingKnowledge: Kernel Methods for Relational Learning and Semantic Modeling
Latest results of statistical learning theory have provided techniques such us pattern analysis and relational learning, which help in modeling system behavior, e.g. the semantics ...
Alessandro Moschitti
TACAS
1998
Springer
81views Algorithms» more  TACAS 1998»
14 years 1 months ago
Formal Design and Analysis of a Gear Controller
In this paper, we report on an application of the validation and veri cation tool kit Uppaal in the design and analysis of a prototype gear controller, carried out in a joint proje...
Magnus Lindahl, Paul Pettersson, Wang Yi
ICIP
2009
IEEE
14 years 10 months ago
Circular Blurred Shape Model For Symbol Spotting In Documents
Symbol spotting problem requires feature extraction strategies able to generalize from training samples and to localize the target object while discarding most part of the image. ...
WSE
2002
IEEE
14 years 1 months ago
Laying the Foundation for Web Services over Legacy Systems
As the use of the World Wide Web becomes more pervasive within our society, businesses and institutions are required to migrate a wide range of services to the web. Difficulties a...
Janet Lavery, Cornelia Boldyreff, Bin Ling, Colin ...