Sciweavers

2210 search results - page 334 / 442
» Applying a Model-based Approach for Embedded System Developm...
Sort
View
ISTAR
2008
15 years 3 months ago
Improving the Syntax and Semantics of Goal Modelling Languages
One major obstacle to requirements engineering (RE) is the growing complexity of today's systems. Such a complexity can only be fficiently by powerful abstraction mechanisms a...
Raimundas Matulevicius
108
Voted
CORR
2007
Springer
151views Education» more  CORR 2007»
15 years 2 months ago
Decision tree modeling with relational views
Data mining is a useful decision support technique that can be used to discover production rules in warehouses or corporate data. Data mining research has made much effort to appl...
Fadila Bentayeb, Jérôme Darmont
ICCD
2005
IEEE
159views Hardware» more  ICCD 2005»
15 years 8 months ago
Architectural-Level Fault Tolerant Computation in Nanoelectronic Processors
Nanoelectronic devices are expected to have extremely high and variable fault rates; thus future processor architectures based on these unreliable devices need to be built with fa...
Wenjing Rao, Alex Orailoglu, Ramesh Karri
VR
1999
IEEE
167views Virtual Reality» more  VR 1999»
15 years 6 months ago
User-Centered Design and Evaluation of a Real-Time Battlefield Visualization Virtual Environment
The ever-increasing power of computers and hardware rendering systems has, to date, primarily motivated the creation of visually rich and perceptually realistic virtual environmen...
Deborah Hix, J. Edward Swan II, Joseph L. Gabbard,...
135
Voted
SPIN
2009
Springer
15 years 9 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...