Sciweavers

2740 search results - page 310 / 548
» A Model-Based Approach To Requirements Analysis
Sort
View
BPM
2008
Springer
164views Business» more  BPM 2008»
15 years 5 months ago
Analyzing Business Continuity through a Multi-layers Model
Business Continuity Management (BCM) is a process to manage risks, emergencies, and recovery plans of an organization during a crisis. It results in a document called Business Cont...
Yudistira Asnar, Paolo Giorgini
JCDL
2010
ACM
151views Education» more  JCDL 2010»
15 years 5 months ago
Domain-specific iterative readability computation
We present a new algorithm to measure domain-specific readability. It iteratively computes the readability of domainspecific resources based on the difficulty of domain-specific c...
Jin Zhao, Min-Yen Kan
DLOG
2006
15 years 5 months ago
Model checking the basic modalities of CTL with Description Logic
Abstract. Model checking is a fully automated technique for determining whether the behaviour of a finite-state reactive system satisfies a temporal logic specification. Despite th...
Shoham Ben-David, Richard J. Trefler, Grant E. Wed...
CL
2008
Springer
15 years 3 months ago
Foundations of a simple and unified component-oriented language
Component-orientedprogramming(COP)isactuallyakeyresearchtrackinsoftwareengineering.Avarietyofcomponent-oriented s (COLs) have been proposed with new or adapted abstractions and me...
Luc Fabresse, Christophe Dony, Marianne Huchard
SIGMETRICS
2008
ACM
111views Hardware» more  SIGMETRICS 2008»
15 years 3 months ago
Predicting the resource consumption of network intrusion detection systems
Abstract. When installing network intrusion detection systems (NIDSs), operators are faced with a large number of parameters and analysis options for tuning trade-offs between dete...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...