Sciweavers

1407 search results - page 117 / 282
» Using Use Cases in Executable Z
Sort
View
IPPS
2003
IEEE
15 years 9 months ago
Are E-Commerce Users Defenceless?
We are interested in new ways of threats and attack on the e-commerce. The server side of e-commerce platform is usually very well protected and secured. Unfortunately, this is no...
Matej Trampus, Mojca Ciglaric, Matjaz Pancur, Tone...
EWCBR
2008
Springer
15 years 6 months ago
Situation Assessment for Plan Retrieval in Real-Time Strategy Games
Case-Based Planning (CBP) is an effective technique for solving planning problems that has the potential to reduce the computational complexity of the generative planning approache...
Kinshuk Mishra, Santiago Ontañón, As...
ECCV
2008
Springer
16 years 6 months ago
Robust Optimal Pose Estimation
Abstract. We study the problem of estimating the position and orientation of a calibrated camera from an image of a known scene. A common problem in camera pose estimation is the e...
Olof Enqvist, Fredrik Kahl
SPAA
2009
ACM
16 years 4 months ago
NZTM: nonblocking zero-indirection transactional memory
This workshop paper reports work in progress on NZTM, a nonblocking, zero-indirection object-based hybrid transactional memory system. NZTM can execute transactions using best-eff...
Fuad Tabba, Mark Moir, James R. Goodman, Andrew W....
SAFECOMP
1998
Springer
15 years 8 months ago
An Agenda for Specifying Software Components with Complex Data Models
Abstract. We present a method to specify software for a special kind of safetycritical embedded systems, where sensors deliver low-level values that must be abstracted and pre-proc...
Kirsten Winter, Thomas Santen, Maritta Heisel