Sciweavers

718 search results - page 30 / 144
» From decision theory to decision aiding methodology
Sort
View
RTA
2005
Springer
15 years 3 months ago
Intruder Deduction for AC-Like Equational Theories with Homomorphisms
Cryptographic protocols are small programs which involve a high level of concurrency and which are difficult to analyze by hand. The most successful methods to verify such protocol...
Pascal Lafourcade, Denis Lugiez, Ralf Treinen
ECBS
2004
IEEE
84views Hardware» more  ECBS 2004»
15 years 1 months ago
A Methodology for Requirements Engineering Process Development
Adoption of the most suitable Requirements Engineering (RE) process and selection of the most appropriate RE techniques for a given project is a common challenge faced by industry...
Li Jiang, Armin Eberlein, Behrouz Homayoun Far
75
Voted
DSVIS
1998
Springer
15 years 1 months ago
The Role of Verification in Interactive Systems Design
Abstract. In this paper we argue that using verification in interactive systems development is more than just checking whether the specification of the system has all the required ...
José Creissac Campos, Michael D. Harrison
OTM
2010
Springer
14 years 7 months ago
Towards Evaluating GRASIM for Ontology-Based Data Matching
The GRASIM (Graph-Aided Similarity calculation) algorithm is designed to solve the problem of ontology-based data matching. We subdivide the matching problem into the ones of restr...
Yan Tang
OSDI
2008
ACM
15 years 10 months ago
From Optimization to Regret Minimization and Back Again
Internet routing is mostly based on static information-it's dynamicity is limited to reacting to changes in topology. Adaptive performance-based routing decisions would not o...
Ioannis C. Avramopoulos, Jennifer Rexford, Robert ...