Sciweavers

2558 search results - page 264 / 512
» Model Composition Contracts
Sort
View
ENTCS
2010
120views more  ENTCS 2010»
15 years 5 months ago
Credo Methodology: Modeling and Analyzing A Peer-to-Peer System in Credo
Credo offers tools and techniques to model and analyze highly reconfigurable distributed systems. In this paper, we present an integrated methodology to use the Credo tool suite. ...
Immo Grabe, Mohammad Mahdi Jaghoori, Bernhard K. A...
157
Voted
ENGL
2008
216views more  ENGL 2008»
15 years 5 months ago
Application of TLM and Cassie-Mayr Arc model on Transformer Aging and Incipient Faults Simulation
Abstract--The development of the transformer insulation failure undergoes three stages: insulation aging, incipient faults and a short circuit. This paper presents a complete schem...
X. Wang, Mark Sumner, D. W. P. Thomas
FASE
2010
Springer
15 years 3 months ago
A Verifiable Modeling Approach to Configurable Role-Based Access Control
Role-based access control (RBAC) is a popular access control model for enterprise systems due to its economic benefit and scalability. There are many RBAC features available, each ...
Dae-Kyoo Kim, Lunjin Lu, Sangsig Kim
129
Voted
COMPSAC
2008
IEEE
15 years 11 months ago
An Adaptive Software Architecture Model Based on Component-Mismatches Detection and Elimination
Commercial-off-the-shelf components (COTS) are widely reused at present and black-box composition is the unique way to integrate them into the target system. However, various mism...
Shan Tang, Xin Peng, Yiming Lau, Wenyun Zhao, Zhix...
DOCENG
2006
ACM
15 years 11 months ago
The limsee3 multimedia authoring model
For most users, authoring multimedia documents remains a complex task. One solution to deal with this problem is to provide template-based authoring tools but with the drawback of...
Romain Deltour, Cécile Roisin