Sciweavers

3555 search results - page 209 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
CIKM
1997
Springer
15 years 8 months ago
An Analysis of Cardinality Constraints in Redundant Relationships
In this paper, we present a complete analysis of redundant relationships in the entity-relationship model. Existing approaches use the concept of functional dependencies for ident...
James Dullea, Il-Yeol Song
SIGSOFT
2007
ACM
16 years 5 months ago
CTG: a connectivity trace generator for testing the performance of opportunistic mobile systems
The testing of the performance of opportunistic communication protocols and applications is usually done through simulation as i) deployments are expensive and should be left to t...
Roberta Calegari, Mirco Musolesi, Franco Raimondi,...
ECBS
2009
IEEE
89views Hardware» more  ECBS 2009»
15 years 11 months ago
Optimisation Process for Maintaining Evolvability during Software Evolution
Software systems have to be changed continuously and evolutionarily throughout the whole time of their development and usage. Meanwhile, the software systems have to remain flexi...
Robert Brcina, Stephan Bode, Matthias Riebisch
FMCAD
2004
Springer
15 years 9 months ago
Integrating Reasoning About Ordinal Arithmetic into ACL2
Abstract. Termination poses one of the main challenges for mechanically verifying infinite state systems. In this paper, we develop a powerful and extensible framework based on th...
Panagiotis Manolios, Daron Vroon
CORR
2010
Springer
108views Education» more  CORR 2010»
15 years 2 months ago
Service Level Agreement (SLA) in Utility Computing Systems
In recent years, extensive research has been conducted in the area of Service Level Agreement (SLA) for utility computing systems. An SLA is a formal contract used to guarantee th...
Linlin Wu, Rajkumar Buyya