Sciweavers

3233 search results - page 203 / 647
» Rule Modeling and Markup
Sort
View
ICMT
2009
Springer
15 years 11 months ago
Automatic Model Generation Strategies for Model Transformation Testing
Testing model transformations requires input models which are graphs of inter-connected objects that must conform to a meta-model and meta-constraints from heterogeneous sources su...
Sagar Sen, Benoit Baudry, Jean-Marie Mottu
DATE
2009
IEEE
150views Hardware» more  DATE 2009»
15 years 11 months ago
A co-design approach for embedded system modeling and code generation with UML and MARTE
—In this paper we propose a UML/MDA approach, called MoPCoM methodology, to design high quality real-time embedded systems. We have defined a set of rules to build UML models fo...
Jorgiano Vidal, Florent de Lamotte, Guy Gogniat, P...
ECAL
2007
Springer
15 years 10 months ago
A Multi-level Selection Model for the Emergence of Social Norms
We develop a multi-level selection model in the framework of indirect reciprocity. Using two levels of selection, one at the individual level and another at the group level, we pro...
Francisco C. Santos, Fabio A. C. C. Chalub, Jorge ...
ISMIS
2005
Springer
15 years 10 months ago
Learning the Daily Model of Network Traffic
Abstract. Anomaly detection is based on profiles that represent normal behaviour of users, hosts or networks and detects attacks as significant deviations from these profiles. In t...
Costantina Caruso, Donato Malerba, Davide Papagni
126
Voted
ICICS
2005
Springer
15 years 10 months ago
Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG)
Modeling and analysis of information system vulnerabilities helps us to predict possible attacks to networks using the network configuration and vulnerabilities information. As a f...
Hamid Reza Shahriari, Reza Sadoddin, Rasool Jalili...