Sciweavers

3555 search results - page 154 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
ICSE
2009
IEEE-ACM
15 years 10 months ago
Using quantitative analysis to implement autonomic IT systems
The software underpinning today’s IT systems needs to adapt dynamically and predictably to rapid changes in system workload, environment and objectives. We describe a software f...
Radu Calinescu, Marta Z. Kwiatkowska
141
Voted
RTCSA
2008
IEEE
15 years 10 months ago
Verification of COMDES-II Systems Using UPPAAL with Model Transformation
COMDES-II is a component-based software framework intended for Model Integrated Computing (MIC) of embedded control systems with hard real-time constraints. We present a transforma...
Xu Ke, Paul Pettersson, Krzysztof Sierszecki, Chri...
186
Voted
WSC
2007
15 years 6 months ago
Predicting the impact on business performance of enhanced information system using business process simulation
The estimation of the impact on performance in business process (BP) by introducing an information system (IS) is an important practical problem in investment appraisal. This pape...
Yifei Tan, Soemon Takakuwa
151
Voted
EKNOW
2009
15 years 1 months ago
Process Diagnostics: A Method Based on Process Mining
As organizations change, their information systems can evolve from simple systems to complex systems, which are hard to understand, and therefore hard to maintain or extend. Proces...
Melike Bozkaya, Joost Gabriels, Jan Martijn E. M. ...
SCP
2011
255views Communications» more  SCP 2011»
14 years 10 months ago
Map fusion for nested datatypes in intensional type theory
A definitional extension LNGMIt of the Calculus of Inductive Constructions (CIC), that underlies the proof assistant Coq, is presented that allows also to program with nested dat...
Ralph Matthes