Sciweavers

639 search results - page 95 / 128
» Dominance Constraints with Set Operators
Sort
View
DAGSTUHL
2003
14 years 11 months ago
Pattern Synthesis from Multiple Scenarios for Parameterized Real-Time UML Models
Abstract. The continuing trend towards more sophisticated technical applications results in an increasing demand for high quality software for complex, safety-critical systems. Des...
Holger Giese, Florian Klein, Sven Burmester
HM
2010
Springer
146views Optimization» more  HM 2010»
14 years 10 months ago
An Improved Memetic Algorithm for Break Scheduling
In this paper we consider solving a complex real life break scheduling problem. This problem of high practical relevance arises in many working areas, e.g. in air traffic control a...
Magdalena Widl, Nysret Musliu
SIGMETRICS
2008
ACM
111views Hardware» more  SIGMETRICS 2008»
14 years 9 months ago
Predicting the resource consumption of network intrusion detection systems
Abstract. When installing network intrusion detection systems (NIDSs), operators are faced with a large number of parameters and analysis options for tuning trade-offs between dete...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...
ETS
2009
IEEE
99views Hardware» more  ETS 2009»
14 years 7 months ago
On Minimization of Peak Power for Scan Circuit during Test
Scan circuit generally causes excessive switching activity compared to normal circuit operation. The higher switching activity in turn causes higher peak power supply current whic...
Jaynarayan T. Tudu, Erik Larsson, Virendra Singh, ...
CCGRID
2010
IEEE
14 years 4 months ago
Towards Autonomic Service Provisioning Systems
This paper discusses our experience in building SPIRE, an autonomic system for service provision. The architecture consists of a set of hosted Web Services subject to QoS constrain...
Michele Mazzucco