Sciweavers

2527 search results - page 368 / 506
» A UML-Based Approach to System Testing
Sort
View
SACMAT
2010
ACM
15 years 8 months ago
Monitoring security policies with metric first-order temporal logic
We show the practical feasibility of monitoring complex security properties using a runtime monitoring approach for metric first-order temporal logic. In particular, we show how ...
David A. Basin, Felix Klaedtke, Samuel Müller
GECCO
2009
Springer
121views Optimization» more  GECCO 2009»
15 years 8 months ago
Using memetic algorithms to improve portfolio performance in static and dynamic trading scenarios
The Portfolio Optimization problem consists of the selection of a group of assets to a long-term fund in order to minimize the risk and maximize the return of the investment. This...
Claus de Castro Aranha, Hitoshi Iba
SEMWEB
2009
Springer
15 years 8 months ago
DOGMA: A Disk-Oriented Graph Matching Algorithm for RDF Databases
RDF is an increasingly important paradigm for the representation of information on the Web. As RDF databases increase in size to approach tens of millions of triples, and as sophis...
Matthias Bröcheler, Andrea Pugliese, V. S. Su...
ICRA
1999
IEEE
119views Robotics» more  ICRA 1999»
15 years 8 months ago
Programming in the Architecture for Agile Assembly
The goal of the Architecture for Agile Assembly AAA is to enable rapid deployment and recon guration of automated assembly systems through the use of cooperating, modular, robust,...
Jay Gowdy, Alfred A. Rizzi
WETICE
1998
IEEE
15 years 8 months ago
Using Components for Modeling Intelligent and Collaborative Mobile Agents
Intelligence, collaboration and mobility are the main important features in designing agents for electronic commercial systems. But very few systems permit to implement agents whi...
Min-Jung Woo, Jean-Pierre Briot, Jacques Ferber