Sciweavers

416 search results - page 46 / 84
» Enough of Processes - Lets do Practices
Sort
View
79
Voted
RTCSA
2006
IEEE
15 years 3 months ago
Automatic Generation and Validation of Models of Legacy Software
The modeling approach is not used to its full potential in maintenance of legacy systems. Often, models do not even exist. The main reasons being that the economic implications an...
Joel Huselius, Johan Andersson, Hans Hansson, Sasi...
AOSE
2005
Springer
15 years 3 months ago
Hermes: Designing Goal-Oriented Agent Interactions
Interactions between agents are traditionally specified as interaction protocols using notations such as Petri nets, AUML, or finite state machines. These protocols are a poor ...
Christopher Cheong, Michael Winikoff
CAISE
2005
Springer
15 years 3 months ago
A Method and Tool for Business-IT Alignment in Enterprise Architecture
Enterprise architects seek to align enterprise processes and structure with their supporting IT systems so that enterprises can flourish in their environment. The enterprise archi...
Alain Wegmann, Pavel Balabko, Lam-Son Lê, Gi...
83
Voted
DSN
2003
IEEE
15 years 3 months ago
Reliable Communication in Overlay Networks
Abstract— Reliable point-to-point communication is usually achieved in overlay networks by applying TCP/IP on the end nodes of a connection. This paper presents an hopby-hop reli...
Yair Amir, Claudiu Danilov
SMI
2003
IEEE
142views Image Analysis» more  SMI 2003»
15 years 3 months ago
Approximate Congruence Detection of Model Features for Reverse Engineering
Reverse engineering allows the geometric reconstruction of simple mechanical parts. However, the resulting models suffer from inaccuracies caused by errors in measurement and reco...
C. H. Gao, Frank C. Langbein, A. David Marshall, R...