Sciweavers

2004 search results - page 58 / 401
» Comparison of Model Checking Tools for Information Systems
Sort
View
USS
2004
15 years 1 months ago
TIED, LibsafePlus: Tools for Runtime Buffer Overflow Protection
Buffer overflow exploits make use of the treatment of strings in C as character arrays rather than as first-class objects. Manipulation of arrays as pointers and primitive pointer...
Kumar Avijit, Prateek Gupta, Deepak Gupta
AIEDU
2005
106views more  AIEDU 2005»
14 years 11 months ago
A Comparison of Model-Tracing and Constraint-Based Intelligent Tutoring Paradigms
Two approaches to building intelligent tutoring systems are the well-established model-tracing paradigm and the relatively newer constraint-based paradigm. Proponents of the constr...
Viswanathan Kodaganallur, Rob R. Weitz, David Rose...
IFIP
1994
Springer
15 years 3 months ago
The specification of business rules: A comparison of selected methodologies
Business rules are an important element of information systems. The notion business rule encompasses different phenomena; therefore, some classification criteria are presented and...
Holger Herbst, Gerhard Knolmayer, Thomas Myrach, M...
DAWAK
2009
Springer
15 years 28 days ago
Open Source BI Platforms: A Functional and Architectural Comparison
While in the past the BI market was strictly dominated by closed source and commercial tools, the last few years were characterized by the birth of open source solutions: first as ...
Matteo Golfarelli
DFG
2004
Springer
15 years 3 months ago
Verification of PLC Programs Given as Sequential Function Charts
Programmable Logic Controllers (PLC) are widespread in the manufacturing and processing industries to realize sequential procedures and to avoid safety-critical states. For the spe...
Nanette Bauer, Sebastian Engell, Ralf Huuck, Sven ...