Sciweavers

5255 search results - page 324 / 1051
» Formal Methods for Privacy
Sort
View
EMSOFT
2009
Springer
15 years 11 months ago
Analytic real-time analysis and timed automata: a hybrid method for analyzing embedded real-time systems
This paper advocates a strict compositional and hybrid approach for obtaining key (performance) metrics of embedded At its core the developed methodology abstracts system componen...
Kai Lampka, Simon Perathoner, Lothar Thiele
CNSR
2006
IEEE
136views Communications» more  CNSR 2006»
15 years 10 months ago
Combining Petri Nets and ns-2: A Hybrid Method for Analysis and Simulation
Network protocol performance and evaluation study is often carried out using a couple of widely used simulation toolkits, such as ns-2 and OPNET. These toolkits usually contain ma...
Qiang Ye, Mike H. MacGregor
HICSS
2003
IEEE
250views Biometrics» more  HICSS 2003»
15 years 10 months ago
A Method for Demand-Driven Information Requirements Analysis in Data Warehousing Projects
Information requirements analysis for data warehouse systems differs significantly from requirements analysis for conventional information systems. Existing data warehouse specifi...
Robert Winter, Bernhard Strauch
ISCC
2002
IEEE
147views Communications» more  ISCC 2002»
15 years 9 months ago
A new method for finding generalized frequent itemsets in generalized association rule mining
Generalized association rule mining is an extension of traditional association rule mining to discover more informative rules, given a taxonomy. In this paper, we describe a forma...
Kritsada Sriphaew, Thanaruk Theeramunkong
CG
2010
Springer
15 years 2 months ago
A Principled Method for Exploiting Opening Books
We used in the past a lot of computational power and human expertise for having a very big dataset of good 9x9 Go games, in order to build an opening book. We improved a lot the al...
Romaric Gaudel, Jean-Baptiste Hoock, Julien Perez,...