Sciweavers

872 search results - page 54 / 175
» Using Plans to Automate Software Applications
Sort
View
CCS
2010
ACM
13 years 10 months ago
TASTY: tool for automating secure two-party computations
Secure two-party computation allows two untrusting parties to jointly compute an arbitrary function on their respective private inputs while revealing no information beyond the ou...
Wilko Henecka, Stefan Kögl, Ahmad-Reza Sadegh...
UML
2005
Springer
14 years 3 months ago
A Formal Enforcement Framework for Role-Based Access Control Using Aspect-Oriented Programming
Many of today’s software applications require a high-level of security, defined by a detailed policy and attained via mechanisms such as role-based access control (RBAC), mandat...
Jaime A. Pavlich-Mariscal, Laurent Michel, Steven ...
SEKE
2004
Springer
14 years 3 months ago
UCDA: Use Case Driven Development Assistant Tool for Class Model Generation
The development of class models using the Rational Unified Process (RUP) requires complete, correct and unambiguous use case specification documents. The Use Case Driven Developmen...
Kalaivani Subramaniam, Dong Liu, Behrouz Homayoun ...
COMPGEOM
2005
ACM
13 years 12 months ago
The Visibility-Voronoi Complex and Its Applications
We introduce a new type of diagram called the VV(c)-diagram (the visibility–Voronoi diagram for clearance c), which is a hybrid between the visibility graph and the Voronoi diag...
Ron Wein, Jur P. van den Berg, Dan Halperin
CAIP
2005
Springer
220views Image Analysis» more  CAIP 2005»
14 years 3 months ago
Application of Automatic Image Registration in a Segmentation Framework of Pelvic CT Images
In radiation treatment (RT) planning, clinicians must trace the outline of a few critical structures on a large number of images. Using automated image segmentation could save trem...
Attila Tanács, Eörs Máté...