Sciweavers

3516 search results - page 544 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
PRIMA
2007
Springer
15 years 10 months ago
Supporting Requirements Analysis in Tropos: A Planning-Based Approach
Abstract. Software systems are becoming more and more part of human life influencing organizational and social activities. This introduces the need of considering the design of a ...
Volha Bryl, Paolo Giorgini, John Mylopoulos
CHI
2004
ACM
16 years 4 months ago
Predictive human performance modeling made easy
Although engineering models of user behavior have enjoyed a rich history in HCI, they have yet to have a widespread impact due to the complexities of the modeling process. In this...
Bonnie E. John, Konstantine C. Prevas, Dario D. Sa...
CODES
2008
IEEE
15 years 10 months ago
Static analysis of processor stall cycle aggregation
Processor Idle Cycle Aggregation (PICA) is a promising approach for low power execution of processors, in which small memory stalls are aggregated to create a large one, and the p...
Jongeun Lee, Aviral Shrivastava
ICSE
2008
IEEE-ACM
16 years 4 months ago
Tool support for the navigation in graphical models
Graphical models are omnipresent in the software engineering field, but most current graphical modeling languages do not scale with the increasing size and complexity of today...
Tobias Reinhard, Silvio Meier, Reinhard Stoiber, C...
JETAI
2007
141views more  JETAI 2007»
15 years 4 months ago
Exchange market for complex commodities: search for optimal matches
The Internet has led to the development of on-line markets, and computer scientists have designed various auction algorithms, as well as automated exchanges for standardized commo...
Eugene Fink, Jianli Gong, Josh Johnson