Sciweavers

92 search results - page 8 / 19
» On CASE Tool Usage at Nokia
Sort
View
106
Voted
IJMMS
2007
173views more  IJMMS 2007»
14 years 11 months ago
Analyzing terror campaigns on the internet: Technical sophistication, content richness, and Web interactivity
Terrorists and extremists are increasingly utilizing Internet technology to enhance their ability to influence the outside world. Due to the lack of multi-lingual and multimedia ...
Jialun Qin, Yilu Zhou, Edna Reid, Guanpi Lai, Hsin...
88
Voted
HVC
2007
Springer
108views Hardware» more  HVC 2007»
15 years 5 months ago
How Fast and Fat Is Your Probabilistic Model Checker? An Experimental Performance Comparison
Abstract. This paper studies the efficiency of several probabilistic model checkers by comparing verification times and peak memory usage for a set of standard case studies. The s...
David N. Jansen, Joost-Pieter Katoen, Marcel Olden...
94
Voted
SMC
2007
IEEE
105views Control Systems» more  SMC 2007»
15 years 6 months ago
Self-organizing knowledge networks for pervasive situation-aware services
Adapting to current context of usage is of fundamental importance for pervasive computing services. As the technology for acquiring contextual information is increasingly availabl...
Matthias Baumgarten, Nicola Bicocchi, Rico Kusber,...
SBMF
2009
Springer
105views Formal Methods» more  SBMF 2009»
15 years 6 months ago
Verifying Compiled File System Code
Abstract. This paper presents a case study on retrospective verication of the Linux Virtual File System (VFS), which is aimed at checking for violations of API usage rules and mem...
Jan Tobias Mühlberg, Gerald Lüttgen
INFSOF
2008
108views more  INFSOF 2008»
14 years 11 months ago
Effectively utilizing project, product and process knowledge
Improving project management, product development and engineering processes is for many companies crucial to survive in a fast changing environment. However, these activities are ...
Christof Ebert, Jozef De Man