Sciweavers

3555 search results - page 147 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
128
Voted
ACMDIS
2004
ACM
15 years 9 months ago
Unpacking critical parameters for interface design: evaluating notification systems with the IRC framework
We elaborate a proposal for capturing, extending, and reusing design knowledge gleaned through usability testing. The proposal is specifically targeted to address interface design...
Christa M. Chewar, D. Scott McCrickard, Alistair G...
162
Voted
CCE
2007
15 years 3 months ago
A systematic approach for soft sensor development
This paper presents a systematic approach based on robust statistical techniques for development of a data-driven soft sensor, which is an important component of the process analy...
Bao Lin, Bodil Recke, Jørgen K. H. Knudsen,...
122
Voted
ACMSE
2006
ACM
15 years 9 months ago
Performance evaluation of the reactor pattern using the OMNeT++ simulator
The design of large-scale, distributed, performance-sensitive systems presents numerous challenges due to their networkcentric nature and stringent quality of service (QoS) requir...
Arundhati Kogekar, Aniruddha S. Gokhale
ICCBR
2001
Springer
15 years 8 months ago
Mining High-Quality Cases for Hypertext Prediction and Prefetching
Case-based reasoning aims to use past experience to solve new problems. A strong requirement for its application is that extensive experience base exists that provides statisticall...
Qiang Yang, Ian Tian Yi Li, Henry Haining Zhang
INFORMATICALT
2000
101views more  INFORMATICALT 2000»
15 years 3 months ago
Closed-loop Robust Identification Using the Indirect Approach
In the previous paper (Pupeikis, 2000) the problem of closed-loop robust identification using the direct approach in the presence of outliers in observations have been considered. ...
Rimantas Pupeikis