Sciweavers

405 search results - page 65 / 81
» Open Systems Formal Evaluation Process
Sort
View
PRDC
2006
IEEE
15 years 4 months ago
Detecting and Exploiting Symmetry in Discrete-state Markov Models
Dependable systems are usually designed with multiple instances of components or logical processes, and often possess symmetries that may be exploited in model-based evaluation. T...
W. Douglas Obal II, Michael G. McQuinn, William H....
ISI
2004
Springer
15 years 3 months ago
A Tool for Internet Chatroom Surveillance
Internet chatrooms are common means of interaction and communications, and they carry valuable information about formal or ad-hoc formation of groups with diverse objectives. This ...
Seyit Ahmet Çamtepe, Mukkai S. Krishnamoort...
HICSS
2003
IEEE
250views Biometrics» more  HICSS 2003»
15 years 3 months ago
A Method for Demand-Driven Information Requirements Analysis in Data Warehousing Projects
Information requirements analysis for data warehouse systems differs significantly from requirements analysis for conventional information systems. Existing data warehouse specifi...
Robert Winter, Bernhard Strauch
CLEIEJ
2002
156views more  CLEIEJ 2002»
14 years 10 months ago
A Fuzzy Model for Function Point Analysis to Development and Enhancement Project Assessments
Function Point Analysis (FPA) is among the most commonly used techniques to estimate the size of software system projects or software systems. During the point counting process th...
Osias de Souza Lima Júnior, Pedro Porf&iacu...
TSE
2008
131views more  TSE 2008»
14 years 10 months ago
Enhancing an Application Server to Support Available Components
Three-tier middleware architecture is commonly used for hosting enterprise-distributed applications. Typically, the application is decomposed into three layers: front end, middle t...
Achmad I. Kistijantoro, Graham Morgan, Santosh K. ...