Sciweavers

3555 search results - page 687 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
AOSD
2003
ACM
15 years 6 months ago
Modularisation and composition of aspectual requirements
An effective requirements engineering (RE) approach must harmonise the need to achieve separation of concerns with the need to satisfy broadly scoped requirements and constraints....
Awais Rashid, Ana M. D. Moreira, João Ara&u...
ATAL
2003
Springer
15 years 6 months ago
Coalition formation with uncertain heterogeneous information
Coalition formation methods allow agents to join together and are thus necessary in cases where tasks can only be performed cooperatively by groups. This is the case in the Reques...
Sarit Kraus, Onn Shehory, Gilad Taase
ECMDAFA
2005
Springer
130views Hardware» more  ECMDAFA 2005»
15 years 6 months ago
Control Flow Analysis of UML 2.0 Sequence Diagrams
This article presents a control flow analysis methodology based on UML 2.0 sequence diagrams (SD). In contrast to the conventional code-based control flow analysis techniques, thi...
Vahid Garousi, Lionel C. Briand, Yvan Labiche
LCPC
2005
Springer
15 years 6 months ago
Supporting SELL for High-Performance Computing
We briefly introduce the notion of Semantically Enhanced Library Languages, SELL, as a practical and economical alternative to special-purpose programming languages for high-perfo...
Bjarne Stroustrup, Gabriel Dos Reis
ECCV
2004
Springer
16 years 3 months ago
Transformation-Invariant Embedding for Image Analysis
Abstract. Dimensionality reduction is an essential aspect of visual processing. Traditionally, linear dimensionality reduction techniques such as principle components analysis have...
Ali Ghodsi, Jiayuan Huang, Dale Schuurmans