Sciweavers

3555 search results - page 196 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
GISCIENCE
2010
Springer
212views GIS» more  GISCIENCE 2010»
15 years 5 months ago
Qualitative Change to 3-Valued Regions
Regions which evolve over time are a significant aspect of many phenomena in geographic information science. Examples include areas in which a measured value (e.g. temperature, sal...
Matt Duckham, John G. Stell, Maria Vasardani, Mich...
ICPR
2004
IEEE
16 years 5 months ago
From Massively Parallel Image Processors to Fault-Tolerant Nanocomputers
Parallel processors such as SIMD computers have been successfully used in various areas of high performance image and data processing. Due to their characteristics of highly regula...
Jie Han, Pieter Jonker
SEAA
2008
IEEE
15 years 10 months ago
Checking Session-Oriented Interactions between Web Services
Although web services are generally envisioned as being stateless, some of them are implicitly stateful. The reason is that the web services often work as front-ends to enterprise...
Pavel Parizek, Jirí Adámek
ISESE
2005
IEEE
15 years 9 months ago
Cloning by accident: an empirical study of source code cloning across software systems
One of the key goals of open source development is the sharing of knowledge, experience, and solutions that pertain to a software system and its problem domain. Source code clonin...
Raihan Al-Ekram, Cory Kapser, Richard C. Holt, Mic...
CDC
2008
IEEE
141views Control Systems» more  CDC 2008»
15 years 10 months ago
Stabilizing uncertain systems with dynamic quantization
—We consider state feedback stabilization of uncertain linear systems with quantization. The plant uncertainty is dealt with by the supervisory control framework, which employs s...
Linh Vu, Daniel Liberzon