Sciweavers

1390 search results - page 233 / 278
» A Methodology for Requirements Engineering Process Developme...
Sort
View
IJCINI
2007
112views more  IJCINI 2007»
14 years 11 months ago
Neo-Symbiosis: The Next Stage in the Evolution of Human Information Interaction
The purpose of this paper is to re-address the vision of human-computer symbiosis as originally expressed by J.C.R. Licklider nearly a half-century ago and to argue for the releva...
Douglas Griffith, Frank L. Greitzer
SIGMETRICS
2008
ACM
111views Hardware» more  SIGMETRICS 2008»
14 years 11 months ago
Predicting the resource consumption of network intrusion detection systems
Abstract. When installing network intrusion detection systems (NIDSs), operators are faced with a large number of parameters and analysis options for tuning trade-offs between dete...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...
CEC
2010
IEEE
15 years 28 days ago
Learning to overtake in TORCS using simple reinforcement learning
In modern racing games programming non-player characters with believable and sophisticated behaviors is getting increasingly challenging. Recently, several works in the literature ...
Daniele Loiacono, Alessandro Prete, Pier Luca Lanz...
EMSOFT
2005
Springer
15 years 5 months ago
Using de-optimization to re-optimize code
The nature of embedded systems development places a great deal of importance on meeting strict requirements in areas such as static code size, power consumption, and execution tim...
Stephen Hines, Prasad Kulkarni, David B. Whalley, ...
INAP
2001
Springer
15 years 4 months ago
Towards Reconciling Use Cases via Controlled Language and Graphical Models
Abstract. In requirements engineering use cases are employed to describe the ow of events and the occurrence of states in a future information system. Use cases consist of a set of...
Kathrin Böttger, Rolf Schwitter, Diego Moll&a...