Sciweavers

33 search results - page 5 / 7
» Maintaining Behavioral Consistency during Schema Evolution
Sort
View
89
Voted
SE
2008
15 years 1 months ago
TIME - Tracking Intra- and Inter-Model Evolution
Abstract: Modern software development approaches, especially the model-driven approaches, heavily rely on the use of models during the whole development process. With the increasin...
Maximilian Kögel
95
Voted
ICMAS
1998
15 years 1 months ago
How to Explore your Opponent's Strategy (almost) Optimally
This work presents a lookahead-based exploration strategy for a model-based learning agent that enables exploration of the opponent's behavior during interaction in a multi-a...
David Carmel, Shaul Markovitch
194
Voted
ICDE
2007
IEEE
145views Database» more  ICDE 2007»
16 years 1 months ago
Fast Identification of Relational Constraint Violations
Logical constraints, (e.g., 'phone numbers in toronto can have prefixes 416, 647, 905 only'), are ubiquitous in relational databases. Traditional integrity constraints, ...
Amit Chandel, Nick Koudas, Ken Q. Pu, Divesh Sriva...
125
Voted
SP
1991
IEEE
121views Security Privacy» more  SP 1991»
15 years 3 months ago
The SRI IDES Statistical Anomaly Detector
SRI International’s real-time intrusion-detection expert system (IDES) system contains a statistical subsystem that observes behavior on a moniioreci cornpuier system and adapti...
H. S. Javitz, A. Valdes
120
Voted
DKE
2011
251views Education» more  DKE 2011»
14 years 6 months ago
Generating operation specifications from UML class diagrams: A model transformation approach
One of the more tedious and complex tasks during the specification of conceptual schemas (CSs) is modeling the operations that define the system behavior. This paper aims to simpl...
Manoli Albert, Jordi Cabot, Cristina Gómez,...