Sciweavers

1140 search results - page 122 / 228
» Embedded Software: Better Models, Better Code
Sort
View
135
Voted
SERA
2007
Springer
15 years 9 months ago
A Particle Swarm Social Model for Multi-Agent Based Insurgency Warfare Simulation
To better understand insurgent activities and asymmetric warfare, a social adaptive model for modeling multiple insurgent groups attacking multiple military and civilian targets i...
Xiaohui Cui, Thomas E. Potok
CASCON
1993
114views Education» more  CASCON 1993»
15 years 4 months ago
A transaction manager component for cooperative transaction models
The database community has produced extensive research on the concurrency control problem in the context of traditional databases. However, this traditional model is not suitable ...
George T. Heineman
CONSTRAINTS
2006
120views more  CONSTRAINTS 2006»
15 years 3 months ago
Constraint Models for the Covering Test Problem
Covering arrays can be applied to the testing of software, hardware and advanced materials, and to the effects of hormone interaction on gene expression. In this paper we develop c...
Brahim Hnich, Steven David Prestwich, Evgeny Selen...
TR
2008
98views more  TR 2008»
15 years 3 months ago
Application of Vulnerability Discovery Models to Major Operating Systems
A number of security vulnerabilities have been reported in the Windows, and Linux operating systems. Both the developers, and users of operating systems have to utilize significant...
Omar H. Alhazmi, Yashwant K. Malaiya
CAISE
2010
Springer
14 years 10 months ago
Configuring the Variability of Business Process Models Using Non-Functional Requirements
The existence of variations in the organizational environment makes the configuration of business process models a complex activity, even for experienced business analysts. The inc...
Emanuel Santos, João Pimentel, Jaelson Cast...