Sciweavers

3555 search results - page 541 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
ISMVL
2010
IEEE
166views Hardware» more  ISMVL 2010»
15 years 7 months ago
Non-deterministic Multi-valued Logics--A Tutorial
Non-deterministic multi-valued matrices (Nmatrices) are a new, fruitful and quickly expanding field of research first introduced a few years ago. Since then it has been rapidly ...
Arnon Avron, Anna Zamansky
IJMMS
2008
86views more  IJMMS 2008»
15 years 4 months ago
An empirical examination of factors contributing to the creation of successful e-learning environments
Although existing models of e-learning effectiveness in information systems (IS) have increased our understanding of how technology can support and enhance learning, most of our m...
Richard D. Johnson, Steven Hornik, Eduardo Salas
SC
1992
ACM
15 years 8 months ago
The Distributed Virtual Windtunnel
An implementation of a distributed virtual environment for the shared interactive visualization of large unsteady three-dimensional flowfields is described. Computation of the vis...
Steve Bryson, Michael J. Gerald-Yamasaki
CCE
2005
15 years 4 months ago
Model-based computer-aided design for controlled release of pesticides
In the field of controlled release technology for pesticides or active ingredients (AI), models that can predict its delivery during application are important for purposes of desi...
Núria Muro-Suñé, Rafiqul Gani...
EMSOFT
2007
Springer
15 years 10 months ago
Virtual execution of AADL models via a translation into synchronous programs
Architecture description languages are used to describe both the hardware and software architecture of an application, at system-level. The basic software components are intended ...
Erwan Jahier, Nicolas Halbwachs, Pascal Raymond, X...