Sciweavers

1585 search results - page 120 / 317
» A framework for computer-aided validation
Sort
View
119
Voted
ICTAI
2008
IEEE
15 years 9 months ago
Scheduling for Dedicated Machine Constraint Using Integer Programming
We propose an Integer Programming (IP) framework to undertake the dedicated photolithography machine constraint in semiconductor manufacturing. The constraint is one of the new ch...
Huy Nguyen Anh Pham, Arthur M. D. Shr, Peter P. Ch...
SIBGRAPI
2007
IEEE
15 years 9 months ago
Application-independent accurate mouse placements on surfaces of arbitrary geometry
Most direct manipulation tasks rely on precise placements of the cursor on the object of interest. Commonly, this requires the knowledge of distinct application-dependent geometry...
Harlen Costa Batagelo, Shin-Ting Wu
CCS
2007
ACM
15 years 9 months ago
Analyzing the vulnerability of superpeer networks against attack
In this paper, we develop an analytical framework to measure the vulnerability of superpeer networks against attack. Two different kinds of attacks namely deterministic and degre...
Bivas Mitra, Fernando Peruani, Sujoy Ghose, Niloy ...
PERSUASIVE
2007
Springer
15 years 9 months ago
The Behavior Chain for Online Participation: How Successful Web Services Structure Persuasion
The success of many online services today depends on the company’s ability to persuade users to take specific actions, such as registering or inviting friends. We examined over 5...
B. J. Fogg, Dean Eckles
ISPW
2006
IEEE
15 years 9 months ago
Simulating the Structural Evolution of Software
As functionality is added to an ageing piece of software, its original design and structure tends to erode. The underlying forces which cause such degradation have been the subject...
Benjamin Stopford, Steve Counsell