Sciweavers

851 search results - page 120 / 171
» Managing (Requirements) Evolutions of High Assurance Systems
Sort
View
KDD
2007
ACM
151views Data Mining» more  KDD 2007»
15 years 10 months ago
Efficient mining of iterative patterns for software specification discovery
Studies have shown that program comprehension takes up to 45% of software development costs. Such high costs are caused by the lack-of documented specification and further aggrava...
Chao Liu 0001, David Lo, Siau-Cheng Khoo
PERVASIVE
2008
Springer
14 years 9 months ago
Context-aware routing in wireless mesh networks
Wireless mesh networks promise to deliver resilient connectivity among network nodes, allowing data to be relayed seamlessly between mobile clients and infrastructure. Routing is ...
Peizhao Hu, Marius Portmann, Ricky Robinson, Jadwi...
GI
2009
Springer
14 years 7 months ago
Towards Integration of Uncertain Sensor Data into Context-aware Workflows
: The integration and usage of uncertain sensor data in workflows is a difficult problem. In this paper we describe these difficulties which result from the combination of very dis...
Matthias Wieland, Uwe-Philipp Käppeler, Paul ...
IEEEARES
2006
IEEE
15 years 3 months ago
A Component Based Software Architecture for E-Government Applications
The raising need for e-government applications leads to many new approaches in this sector. To fulfill the requirement for a flexible government-to-government (G2G) software sys...
Daniel Beer, Raphael Kunis, Gudula Rünger
JUCS
2002
116views more  JUCS 2002»
14 years 9 months ago
Bounded Flooding Routing Algorithm for Provisioning the Globally Optimal Route in a Hierarchical ATM Network
: ATM virtual path (VP) contains bundles of virtual channels (VCs). A VP layer network can be used as a server layer network of VC layer networks and each VC layer network can be a...
Daniel Won-Kyu Hong, Choong Seon Hong, Dong-Sik Yu...