Sciweavers

963 search results - page 92 / 193
» Formal Analysis of BPMN Models Using Event-B
Sort
View
CIKM
2011
Springer
14 years 1 months ago
Lower-bounding term frequency normalization
In this paper, we reveal a common deficiency of the current retrieval models: the component of term frequency (TF) normalization by document length is not lower-bounded properly;...
Yuanhua Lv, ChengXiang Zhai
REFSQ
2009
Springer
15 years 8 months ago
Composing Models for Detecting Inconsistencies: A Requirements Engineering Perspective
Abstract. [Context and motivation] Ever-growing systems’ complexity and novel requirements engineering approaches such as reuse or globalization imply that requirements are produ...
Gilles Perrouin, Erwan Brottier, Benoit Baudry, Yv...
ICARIS
2009
Springer
15 years 8 months ago
Exploration of the Dendritic Cell Algorithm Using the Duration Calculus
As one of the newest members in Artificial Immune Systems (AIS), the Dendritic Cell Algorithm (DCA) has been applied to a range of problems. These applications mainly belong to th...
Feng Gu, Julie Greensmith, Uwe Aickelin
CCS
2007
ACM
15 years 7 months ago
Toward measuring network security using attack graphs
In measuring the overall security of a network, a crucial issue is to correctly compose the measure of individual components. Incorrect compositions may lead to misleading results...
Lingyu Wang, Anoop Singhal, Sushil Jajodia
ISOLA
2010
Springer
14 years 11 months ago
Model-Driven Design-Space Exploration for Embedded Systems: The Octopus Toolset
Abstract. The complexity of today's embedded systems and their development trajectories requires a systematic, model-driven design approach, supported by tooling wherever poss...
Twan Basten, Emiel van Benthum, Marc Geilen, Marti...