Sciweavers

1432 search results - page 228 / 287
» Executable Protocol Models as a Requirements Engineering Too...
Sort
View
175
Voted
SIGMETRICS
1998
ACM
187views Hardware» more  SIGMETRICS 1998»
15 years 7 months ago
An Analytic Behavior Model for Disk Drives with Readahead Caches and Request Reordering
Modern disk drives read-ahead data and reorder incoming requests in a workload-dependent fashion. This improves their performance, but makes simple analytical models of them inade...
Elizabeth A. M. Shriver, Arif Merchant, John Wilke...
126
Voted
DAGSTUHL
2006
15 years 4 months ago
A Petri Net Approach to Verify and Debug Simulation Models
Verification and Simulation share many issues, one is that simulation models require validation and verification. In the context of simulation, verification is understood as the ta...
Peter Kemper, Carsten Tepper
157
Voted
SIGSOFT
2001
ACM
16 years 4 months ago
Detecting implied scenarios in message sequence chart specifications
Scenario-based specifications such as Message Sequence Charts (MSCs) are becoming increasingly popular as part of a requirements specification. Scenarios describe how system compo...
Jeff Kramer, Jeff Magee, Sebastián Uchitel
103
Voted
ICRA
2007
IEEE
156views Robotics» more  ICRA 2007»
15 years 9 months ago
Development and Application of a New Steady-Hand Manipulator for Retinal Surgery
— This paper describes the development and initial testing of a new and optimized version of a steady-hand manipulator for retinal microsurgery. In the steady-hand paradigm, the ...
Ben Mitchell, John Koo, Iulian Iordachita, Peter K...
139
Voted
CORR
2010
Springer
116views Education» more  CORR 2010»
14 years 10 months ago
Simulating Cyber-Attacks for Fun and Profit
We introduce a new simulation platform called Insight, created to design and simulate cyber-attacks against large arbitrary target scenarios. Insight has surprisingly low hardware...
Ariel Futoransky, Fernando Miranda, José Ig...