Sciweavers

851 search results - page 112 / 171
» Managing (Requirements) Evolutions of High Assurance Systems
Sort
View
OOPSLA
2005
Springer
15 years 7 months ago
X10: an object-oriented approach to non-uniform cluster computing
It is now well established that the device scaling predicted by Moore’s Law is no longer a viable option for increasing the clock frequency of future uniprocessor systems at the...
Philippe Charles, Christian Grothoff, Vijay A. Sar...
136
Voted
ISF
2008
114views more  ISF 2008»
15 years 1 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
TASE
2008
IEEE
15 years 1 months ago
Stochastic Modeling of an Automated Guided Vehicle System With One Vehicle and a Closed-Loop Path
Abstract--The use of automated guided vehicles (AGVs) in material-handling processes of manufacturing facilities and warehouses isbecomingincreasinglycommon.AcriticaldrawbackofanAG...
Aykut F. Kahraman, Abhijit Gosavi, Karla J. Oty
107
Voted
SIGSOFT
2008
ACM
16 years 2 months ago
On exceptions and the software development life cycle
ion that the system under development is looked at. We outline a mapping relating exceptions at a high level action to exceptions and other software artifacts at vels of abstractio...
Jörg Kienzle
IESA
2007
15 years 3 months ago
Formalizing the OPAL eBusiness ontology design patterns with OWL
Domain ontology building is one of the most critical activities required in Semantic Web applications. The task must be performed by domain experts, who do not (generally) have the...
Fulvio D'Antonio, Michele Missikoff, Francesco Tag...