Sciweavers

3555 search results - page 500 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
TSE
2002
99views more  TSE 2002»
15 years 5 months ago
Recovering Traceability Links between Code and Documentation
Software system documentation is almost always expressed informally in natural language and free text. Examples include requirement specifications, design documents, manual pages, ...
Giuliano Antoniol, Gerardo Canfora, Gerardo Casazz...
ISSRE
2010
IEEE
15 years 3 months ago
Pinpointing the Subsystems Responsible for the Performance Deviations in a Load Test
—Large scale systems (LSS) contain multiple subsystems that interact across multiple nodes in sometimes unforeseen and complicated ways. As a result, pinpointing the subsystems t...
Haroon Malik, Bram Adams, Ahmed E. Hassan
TIT
2010
131views Education» more  TIT 2010»
15 years 5 days ago
Characterization of SINR region for interfering links with constrained power
In this paper, a communication system including n interfering additive white Gaussian noise (AWGN) links is considered. Each transmitter uses a Gaussian codebook and each receiver...
Hajar Mahdavi-Doost, Masoud Ebrahimi, Amir K. Khan...
ICASSP
2011
IEEE
14 years 9 months ago
Evaluation of adaptive blind SIMO identification in terms of a normalized filter-projection misalignment
The blind identification of single-input multiple-output (SIMO) systems suffers in the presence of near-common and exact common zeros between the channels, particularly in conjun...
Dominic Schmid, Gerald Enzner
EMSOFT
2010
Springer
15 years 3 months ago
From high-level component-based models to distributed implementations
Constructing correct distributed systems from their high-level models has always been a challenge and often subject to serious errors because of their non-deterministic and non-at...
Borzoo Bonakdarpour, Marius Bozga, Mohamad Jaber, ...