Sciweavers

3555 search results - page 595 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
IRI
2008
IEEE
15 years 8 months ago
Model check stochastic supply chains
—Supply chain [2], [6] is an important component of business operations. Understanding its stochastic behaviors is the key to risk analysis and performance evaluation in supply c...
Li Tan, Shenghan Xu
HICSS
2007
IEEE
126views Biometrics» more  HICSS 2007»
15 years 7 months ago
Contract as a Source of Trust--Commitment in Successful IT Outsourcing Relationship: An Empirical Study
Existing studies on IT outsourcing have mainly examined partnership factors that influence IT outsourcing effectiveness. This stream of IT outsourcing research has largely ignored...
Jahyun Goo, Kichan Nam
IPPS
2007
IEEE
15 years 7 months ago
High Performance Java Sockets for Parallel Computing on Clusters
The use of Java for parallel programming on clusters relies on the need of efficient communication middleware and high-speed cluster interconnect support. Nevertheless, currently...
Guillermo L. Taboada, Juan Touriño, Ramon D...
SCESM
2006
ACM
257views Algorithms» more  SCESM 2006»
15 years 7 months ago
Test ready UML statechart models
The dynamic behavior of systems is best described by Finite-state machines. Generation of executable tests from behavioral models such as UML Statecharts offers benefits such as s...
P. V. R. Murthy, P. C. Anitha, M. Mahesh, Rajesh S...
DFT
2005
IEEE
89views VLSI» more  DFT 2005»
15 years 7 months ago
On-Line Identification of Faults in Fault-Tolerant Imagers
Detection of defective pixels that develop on-line is a vital part of fault tolerant schemes for repairing imagers during operation. This paper presents a new algorithm for the id...
Glenn H. Chapman, Israel Koren, Zahava Koren, Jozs...