Sciweavers

7209 search results - page 934 / 1442
» Software Engineering for Multi-Agent Systems
Sort
View
AOSD
2004
ACM
15 years 9 months ago
Deriving security requirements from crosscutting threat descriptions
It is generally accepted that early determination of the stakeholder requirements assists in the development of systems that better meet the needs of those stakeholders. General s...
Charles B. Haley, Robin C. Laney, Bashar Nuseibeh
WOSP
2004
ACM
15 years 9 months ago
Collecting whole-system reference traces of multiprogrammed and multithreaded workloads
The simulated evaluation of memory management policies relies on reference traces—logs of memory operations performed by running processes. No existing approach to reference tra...
Scott F. Kaplan
IUI
2003
ACM
15 years 9 months ago
An adaptive stock tracker for personalized trading advice
The Stock Tracker is an adaptive recommendation system for trading stocks that automatically acquires content-based models of user preferences to tailor its buy and sell advice. T...
Jungsoon P. Yoo, Melinda T. Gervasio, Pat Langley
AC
2003
Springer
15 years 9 months ago
Biometric Gait Recognition
Psychological studies indicate that people have a small but statistically significant ability to recognize the gaits of individuals that they know. Recently, there has been much i...
Jeffrey E. Boyd, James J. Little
FM
2003
Springer
115views Formal Methods» more  FM 2003»
15 years 9 months ago
Model Checking FTA
Safety is increasingly important for software based, critical systems. Fault tree analysis (FTA) is a safety technique from engineering, developed for analyzing and assessing syste...
Andreas Thums, Gerhard Schellhorn