Sciweavers

6047 search results - page 297 / 1210
» Modeling with Extend
Sort
View
IJWET
2006
163views more  IJWET 2006»
15 years 4 months ago
A CASE tool for modelling and automatically generating web service-enabled applications
: This paper presents a CASE tool for the high-level specification of web applications integrated with web services. The CASE tool is based on WebML, a conceptual modelling languag...
Marco Brambilla, Stefano Ceri, Sara Comai, Piero F...
SOPR
2002
106views more  SOPR 2002»
15 years 4 months ago
A discrete simulation model for assessing software project scheduling policies
Good project scheduling is an essential, but extremely hard task in software management practice. In a software project, the time needed to complete some development activity is d...
Frank Padberg
JSAC
2010
104views more  JSAC 2010»
15 years 2 months ago
A priority-based processor sharing model for TDM passive optical networks
—The use of passive optical networks (PONs) enables access rates of multi-Gbit/sec bandwidth and provision of quality of service for high definition multimedia services. In this...
Yan Wang, Moshe Zukerman, Ron Addie, Sammy Chan, R...
CVPR
2012
IEEE
13 years 6 months ago
Image categorization using Fisher kernels of non-iid image models
The bag-of-words (BoW) model treats images as an unordered set of local regions and represents them by visual word histograms. Implicitly, regions are assumed to be identically an...
Ramazan Gokberk Cinbis, Jakob J. Verbeek, Cordelia...
KBSE
2007
IEEE
15 years 10 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr