Sciweavers

3555 search results - page 551 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
ECIS
2004
15 years 5 months ago
E-learning: planned and emergent strategies
E-learning is a new strategic arena for higher education, and higher education institutions (HEIs) need to acquire the necessary competencies and capabilities to participate. Thes...
Julian M. Sims, Philip Powell, Richard T. Vidgen
126
Voted
WCE
2007
15 years 5 months ago
A mathematical study of the pantograph/catenary dynamic interaction on transition spans
—This paper presents the work carried out by CALPE team on the development of a mathematical model used in the study and simulation of the pantograph-catenarydynamic interaction ...
Jesús Benet, Angelines Alberto, Enrique Ari...
132
Voted
ERCIMDL
2010
Springer
144views Education» more  ERCIMDL 2010»
15 years 5 months ago
Capacity-Constrained Query Formulation
Given a set of keyphrases, we analyze how Web queries with these phrases can be formed that, taken altogether, return a specified number of hits. The use case of this problem is a ...
Matthias Hagen, Benno Stein
140
Voted
CORR
2008
Springer
104views Education» more  CORR 2008»
15 years 4 months ago
A General Framework for Sound and Complete Floyd-Hoare Logics
er presents an abstraction of Hoare logic to traced symmetric monoidal categories, a eral framework for the theory of systems. Our abstraction is based on a traced monoidal functor...
Rob Arthan, Ursula Martin, Erik A. Mathiesen, Paul...
INFSOF
2007
81views more  INFSOF 2007»
15 years 3 months ago
An infrastructure to support interoperability in reverse engineering
An infrastructure is a set of interconnected structural elements, such as tools and schemas, that provide a framework for supporting an entire structure. The reverse engineering c...
Nicholas A. Kraft, Brian A. Malloy, James F. Power