Sciweavers

3555 search results - page 101 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
CAISE
2008
Springer
15 years 3 months ago
On Modeling and Analyzing Cost Factors in Information Systems Engineering
Introducing enterprise information systems (EIS) is usually associated with high costs. It is therefore crucial to understand those factors that determine or influence these costs....
Bela Mutschler, Manfred Reichert
HICSS
2003
IEEE
156views Biometrics» more  HICSS 2003»
15 years 6 months ago
Developing Video Services for Mobile Users
Video information, image processing and computer vision techniques are developing rapidly nowadays because of the availability of acquisition, processing and editing tools, which ...
Mohamed Ahmed, Roger Impey, Ahmed Karmouch
ASM
2005
ASM
15 years 7 months ago
State Exploration with Multiple State Groupings
Abstract. Exploration algorithms are relevant to the industrial practice of gentest cases from an abstract state machine whose runs define the predicted behavior of the software s...
Colin Campbell, Margus Veanes
HICSS
2010
IEEE
192views Biometrics» more  HICSS 2010»
15 years 1 months ago
Benefits of Enterprise Systems Use
Realizing business value and identifying the benefits arising from implementations of enterprise systems remains a significant challenge for both research and practice. A review o...
Susan P. Williams, Petra Schubert
ENTCS
2006
168views more  ENTCS 2006»
15 years 1 months ago
Case Study: Model Transformations for Time-triggered Languages
In this study, we introduce a model transformation tool for a time-triggered language: Giotto. The tool uses graphs to represent the source code (Giotto) and the target (the sched...
Tivadar Szemethy