Sciweavers

2351 search results - page 313 / 471
» A Method of Requirement Inconsistency Analysis
Sort
View
117
Voted
APSCC
2008
IEEE
15 years 7 days ago
Contract-Based Security Monitors for Service Oriented Software Architecture
Monitors have been used for real-time systems to ensure proper behavior; however, most approaches do not allow for the addition of relevant fields required to identify and react t...
Alexander M. Hoole, Issa Traoré
96
Voted
DAS
2008
Springer
15 years 10 hour ago
Handling of Surface Modifications for Robust Image Based Mail Piece Comparison
Image based mail piece identification is a new technology for optimizing the postal sorting process. Exploiting the mail piece surface uniqueness, characteristic features are used...
Katja Worm, Beate Meffert
84
Voted
NETWORKING
2007
14 years 11 months ago
On-Line Predictive Load Shedding for Network Monitoring
Building robust network monitoring applications is hard given the unpredictable nature of network traffic. Complex analysis on streaming network data usually leads to overload situ...
Pere Barlet-Ros, Diego Amores-López, Gianlu...
87
Voted
DLOG
2006
14 years 11 months ago
Model checking the basic modalities of CTL with Description Logic
Abstract. Model checking is a fully automated technique for determining whether the behaviour of a finite-state reactive system satisfies a temporal logic specification. Despite th...
Shoham Ben-David, Richard J. Trefler, Grant E. Wed...
AAAI
1990
14 years 11 months ago
Approximation Reformulations
Although computers are widely used to simulate complex physical systems, crafting the underlying models that enable computer analysis remains difficult. When a model is created fo...
Daniel S. Weld