Sciweavers

1460 search results - page 190 / 292
» Meeting people where they are
Sort
View
TII
2011
206views Education» more  TII 2011»
14 years 6 months ago
Timing-Failure Risk Assessment of UML Design Using Time Petri Net Bound Techniques
Abstract—Software systems that do not meet their timing constraints can cause risks. In this work, we propose a comprehensive method for assessing the risk of timing failure by e...
Simona Bernardi, Javier Campos, José Merseg...
TMC
2011
108views more  TMC 2011»
14 years 6 months ago
Spatial-Temporal Coverage Optimization in Wireless Sensor Networks
—Mission-driven sensor networks usually have special lifetime requirements. However, the density of the sensors may not be large enough to satisfy the coverage requirement while ...
Changlei Liu, Guohong Cao
EMISAIJ
2010
14 years 6 months ago
The Proviado Access Control Model for Business Process Monitoring Components
Integrated process support is highly desirable in environments where data related to a particular business process are scattered over distributed, heterogeneous information system...
Manfred Reichert, Sarita Bassil, Ralph Bobrik, Tho...
JCIT
2010
185views more  JCIT 2010»
14 years 6 months ago
GPS/TDOA Hybrid Location Algorithm Based on Federal Kalman Filter
Generally, accuracy of GPS(Global Positioning System) is higher than that of cellular network. But in tall building urban area or indoor, relatively weak GPS signal makes the posi...
Cui-Xia Li, Wei-Ming Liu, Zi-Nan Fu
RE
2010
Springer
14 years 6 months ago
A goal-based framework for contextual requirements modeling and analysis
Abstract Requirements Engineering (RE) research often ignores, or presumes a uniform nature of the context in which the system operates. This assumption is no longer valid in emerg...
Raian Ali, Fabiano Dalpiaz, Paolo Giorgini