Sciweavers

3555 search results - page 84 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
FGCN
2008
IEEE
161views Communications» more  FGCN 2008»
15 years 8 months ago
The Development of Software Pricing Schemata and Its Application to Software Industry in Korea
The purpose of this this research is to suggest comprehensive pricing schemata that software developers can use in the integrated state of software uses. To do so, we have reviewe...
Youngsik Kwak, Yunkyung Lee, Yoonsik Kwak
IRMA
2000
15 years 2 months ago
EMC - A modeling method for developing web-based applications
Early information systems were mainly built around secondary, administrative processes of the value chain (e.g. accounting). But since the internet came into use, more and more pr...
Peter Rittgen
MSS
2000
IEEE
72views Hardware» more  MSS 2000»
15 years 5 months ago
The InTENsity PowerWall: A Case Study for a Shared File System Testing Framework
The InTENsity PowerWall is a display system used for high-resolution visualization of very large volumetric data sets. The display is linked to two separate computing environments...
Alex W. Elder, Thomas Ruwart, Benjamin D. Allen, A...
ENTCS
2006
136views more  ENTCS 2006»
15 years 1 months ago
Automated Game Analysis via Probabilistic Model Checking: a case study
It has been recognised for some time that there are close links between the various logics developed for the analysis of multi-agent systems and the many game-theoretic models dev...
Paolo Ballarini, Michael Fisher, Michael Wooldridg...
IJVR
2007
124views more  IJVR 2007»
15 years 1 months ago
Business Cases for Virtual Human Technology: Evaluation and Exploitation
—One of the main goals of the Virtual Human project was to develop technologies for using Virtual Humans as Human-Machine-Interfaces (HMI) to complex technical devices and system...
Alexander B. Reinecke, Markus Rössler, Nico G...