Sciweavers

3555 search results - page 682 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
CC
2006
Springer
122views System Software» more  CC 2006»
15 years 5 months ago
Context-Sensitive Points-to Analysis: Is It Worth It?
We present the results of an empirical study evaluating the precision of subset-based points-to analysis with several variations of context sensitivity on Java benchmarks of signif...
Ondrej Lhoták, Laurie J. Hendren
ICEB
2004
234views Business» more  ICEB 2004»
15 years 2 months ago
A Component-based Framework for Distributed Business Simulations in E-Business Environments
Simulations preserve the knowledge of complex dynamic systems and consequently transfer the knowledge of the cohesions of its elements to a specified target group. As the progress...
Alexander Hampel, Edward Bernroider
VLSID
2008
IEEE
191views VLSI» more  VLSID 2008»
15 years 7 months ago
Programming and Performance Modelling of Automotive ECU Networks
The last decade has seen a phenomenal increase in the use of electronic components in automotive systems, resulting in the replacement of purely mechanical or hydraulic-implementa...
Samarjit Chakraborty, Sethu Ramesh
IWANN
2007
Springer
15 years 7 months ago
Towards the Integration of a Bioprofile in Ocular Melanoma
Approximately 50% of all patients with intraocular melanoma die of metastatic disease, despite successful treatment of the primary tumour. The main factors associated with mortalit...
Azzam F. Taktak, Antonio Eleuteri, Christian Setzk...
WAW
2004
Springer
178views Algorithms» more  WAW 2004»
15 years 6 months ago
Communities Detection in Large Networks
We develop an algorithm to detect community structure in complex networks. The algorithm is based on spectral methods and takes into account weights and links orientations. Since t...
Andrea Capocci, Vito Domenico Pietro Servedio, Gui...