Sciweavers

1231 search results - page 131 / 247
» A Model Transformation Approach for Design Pattern Evolution...
Sort
View
DAWAK
2009
Springer
15 years 9 months ago
Mining Violations to Relax Relational Database Constraints
Frequent constraint violations on the data stored in a database may suggest that the semantics of the represented reality is changing. In this work we propose a methodology and a t...
Mirjana Mazuran, Elisa Quintarelli, Rosalba Rossat...
BMCBI
2007
142views more  BMCBI 2007»
15 years 4 months ago
Improving model construction of profile HMMs for remote homology detection through structural alignment
Background: Remote homology detection is a challenging problem in Bioinformatics. Arguably, profile Hidden Markov Models (pHMMs) are one of the most successful approaches in addre...
Juliana S. Bernardes, Alberto M. R. Dávila,...
ECMDAFA
2008
Springer
97views Hardware» more  ECMDAFA 2008»
15 years 6 months ago
Model-Driven Security in Practice: An Industrial Experience
Abstract. In this paper we report on our experience on using the socalled model-driven security approach in an MDA industrial project. In model-driven security, "designers spe...
Manuel Clavel, Viviane da Silva, Christiano Braga,...
FDL
2006
IEEE
15 years 10 months ago
Formalizing TLM with Communicating State Machines
Transaction Level Models are widely being used as high-level reference models during embedded systems development. High simulation speed and great modeling flexibility are the ma...
Bernhard Niemann, Christian Haubelt
CODES
2007
IEEE
15 years 8 months ago
Pointer re-coding for creating definitive MPSoC models
Today's MPSoC synthesis and exploration design flows start abstract input specification model captured in a system level design language. Usually this model is created from a...
Pramod Chandraiah, Rainer Dömer