Sciweavers

3555 search results - page 110 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
113
Voted
ISVC
2010
Springer
14 years 12 months ago
Subversion Statistics Sifter
We present Subversion Statistics Sifter, a visualisation and statistics system for exploring the structure and evolution of data contained in Subversion repositories with respect t...
Christoph Müller, Guido Reina, Michael Burch,...
SAC
2003
ACM
15 years 6 months ago
Are Multiagent Algorithms Relevant for Real Hardware? A Case Study of Distributed Constraint Algorithms
Researchers building multi-agent algorithms typically work with abstracted away from real applications. The abstracted problem instances allow systematic and detailed investigatio...
Paul Scerri, Pragnesh Jay Modi, Wei-Min Shen, Mili...
IFIP
2000
Springer
15 years 5 months ago
Implementing Open Network Technologies in Complex Work Practices: A Case from Telemedicine
New non-desktop technologies may turn out to be of a more open and generic nature than traditional information technologies. These technologies consequently pose novel challenges ...
Margunn Aanestad, Ole Hanseth
EWCBR
2004
Springer
15 years 6 months ago
Software Design Retrieval Using Bayesian Networks and WordNet
The complexity of software systems makes design reuse a necessary task in the software development process. CASE tools can provide cognitive assistance in this task, helping the so...
Paulo Gomes
IROS
2009
IEEE
149views Robotics» more  IROS 2009»
15 years 8 months ago
Path planning for data assimilation in mobile environmental monitoring systems
— By combining a low-order model of forecast errors, the extended Kalman filter, and classical continuous optimization, we develop an integrated methodology for planning mobile ...
Franz S. Hover