Sciweavers

1431 search results - page 277 / 287
» Solving Constraints in Model Transformations
Sort
View
ATAL
2009
Springer
15 years 4 months ago
Computing optimal randomized resource allocations for massive security games
Predictable allocations of security resources such as police officers, canine units, or checkpoints are vulnerable to exploitation by attackers. Recent work has applied game-theo...
Christopher Kiekintveld, Manish Jain, Jason Tsai, ...
ISPASS
2006
IEEE
15 years 3 months ago
Critical path analysis of the TRIPS architecture
Fast, accurate, and effective performance analysis is essential for the design of modern processor architectures and improving application performance. Recent trends toward highly...
Ramadass Nagarajan, Xia Chen, Robert G. McDonald, ...
VTC
2006
IEEE
121views Communications» more  VTC 2006»
15 years 3 months ago
Multiobjective QoS-Oriented Planning for Indoor Wireless LANs
Abstract— This paper describes an automatic wireless LAN access points planning approach based on a multicriteria modelling and solving. A realistic and efficient wLAN planning ...
Katia Jaffrès-Runser, Jean-Marie Gorce, St&...
KBSE
2005
IEEE
15 years 3 months ago
Automated test generation for engineering applications
In test generation based on model-checking, white-box test criteria are represented as trap conditions written in a temporal logic. A model checker is used to refute trap conditio...
Songtao Xia, Ben Di Vito, César Muño...
95
Voted
DEXA
2005
Springer
108views Database» more  DEXA 2005»
15 years 2 months ago
Quality-Aware Replication of Multimedia Data
In contrast to alpha-numerical data, multimedia data can have a wide range of quality parameters such as spatial and temporal resolution, and compression format. Users can request ...
Yi-Cheng Tu, Jingfeng Yan, Sunil Prabhakar