Sciweavers

2288 search results - page 323 / 458
» Learning Business Process Models: A Case Study
Sort
View
174
Voted
ICST
2009
IEEE
15 years 2 months ago
Proving Functional Equivalence of Two AES Implementations Using Bounded Model Checking
Bounded model checking--as well as symbolic equivalence checking--are highly successful techniques in the hardware domain. Recently, bit-vector bounded model checkers like CBMC ha...
Hendrik Post, Carsten Sinz
PE
2010
Springer
170views Optimization» more  PE 2010»
15 years 3 months ago
Approximating passage time distributions in queueing models by Bayesian expansion
We introduce Bayesian Expansion (BE), an approximate numerical technique for passage time distribution analysis in queueing networks. BE uses a class of Bayesian networks to appro...
Giuliano Casale
AIME
2005
Springer
15 years 10 months ago
Ontology of Time and Situoids in Medical Conceptual Modeling
Time, events, changes, and processes play a major role in medical conceptual modeling. Representation of time-structures and reasoning about time-oriented medical data are importan...
Heinrich Herre, Barbara Heller
160
Voted
IEEECIT
2010
IEEE
15 years 3 months ago
Model-Level Debugging of Embedded Real-Time Systems
Abstract—Model-driven development has become the stateof-the-art approach for designing embedded real-time systems. heir high level of abstraction, models are easier to understan...
Wolfgang Haberl, Markus Herrmannsdoerfer, Jan Birk...
CSMR
2010
IEEE
14 years 12 months ago
Reverse Engineering Component Models for Quality Predictions
Legacy applications are still widely spread. If a need to change deployment or update its functionality arises, it becomes difficult to estimate the performance impact of such modi...
Steffen Becker, Michael Hauck, Mircea Trifu, Klaus...