Sciweavers

3555 search results - page 605 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
ATAL
2009
Springer
15 years 8 months ago
Operational semantics of goal models in adaptive agents
Several agent-oriented software engineering methodologies address the emerging challenges posed by the increasing need of adaptive software. A common denominator of such methodolo...
Mirko Morandini, Loris Penserini, Anna Perini
P2P
2007
IEEE
15 years 7 months ago
PEPINO: PEer-to-Peer network INspectOr
PEPINO is a simple and effective peer-to-peer network inspector. It visualises not only meaningful pointers and connections between peers, but also the exchange of messages betwee...
Donatien Grolaux, Boris Mejías, Peter Van R...
IWPC
2006
IEEE
15 years 7 months ago
Towards a Client Driven Characterization of Class Hierarchies
Object-oriented legacy systems are hard to maintain because they are hard to understand. One of the main understanding problems is revealed by the so-called ”yo-yo effect” tha...
Petru Florin Mihancea
PPOPP
2006
ACM
15 years 7 months ago
Predicting bounds on queuing delay for batch-scheduled parallel machines
Most space-sharing parallel computers presently operated by high-performance computing centers use batch-queuing systems to manage processor allocation. In many cases, users wishi...
John Brevik, Daniel Nurmi, Richard Wolski
DAGM
2006
Springer
15 years 5 months ago
Classifying Event-Related Desynchronization in EEG, ECoG and MEG Signals
We present the results from three motor-imagery-based Brain-Computer Interface experiments. Brain signals were recorded from 8 untrained subjects using EEG, 4 using ECoG and 10 us...
N. Jeremy Hill, Thomas Navin Lal, Michael Schr&oum...