Sciweavers

726 search results - page 88 / 146
» From Anomaly Reports to Cases
Sort
View
WER
2007
Springer
15 years 6 months ago
A Strategy for Information Source Identification
Eliciting requirements is well known to be a difficult task. Several strategies exist that makes it possible to elicit information from different information sources. These strate...
Julio Cesar Sampaio do Prado Leite, Edson Andrade ...
3DPVT
2006
IEEE
180views Visualization» more  3DPVT 2006»
15 years 6 months ago
Building a 3D Virtual Museum of Native American Baskets
— In this paper we report our progress in building a system for the acquisition, analysis, and visualization of a collection of Native Californian baskets from the Phoebe A. Hear...
Volkan Isler, Bradford Wilson, Ruzena Bajcsy
COMPSAC
2006
IEEE
15 years 6 months ago
Tool Support to Model-based Quality Analysis of Software Architecture
This paper presents an automated software tool SQUARE (Software QUality and ARchitecture modelling Environment). It is designed and implemented to support the analysis of software...
Qian Zhang, Jian Wu, Hong Zhu
GLOBECOM
2006
IEEE
15 years 6 months ago
Topology Control for Constant Rate Mobile Networks
Abstract— Controlling the topology of a wireless ad hoc network is very important from the point of view of performance. One known technique for controlling the topology is throu...
Liang Zhao, Errol L. Lloyd, S. S. Ravi
APLAS
2004
ACM
15 years 5 months ago
Detecting Software Defects in Telecom Applications Through Lightweight Static Analysis: A War Story
In safety-critical and high-reliability systems, software development and maintenance are costly endeavors. The cost can be reduced if software errors can be identified through au...
Tobias Lindahl, Konstantinos F. Sagonas