Sciweavers

368 search results - page 10 / 74
» System BV is NP-complete
Sort
View
CN
2007
64views more  CN 2007»
14 years 9 months ago
A taxonomy for identifying requirement interactions in software systems
This paper presents an interaction taxonomy for classifying and identifying requirement interactions in software systems. The proposed taxonomy is in the form of a four-layered py...
Mohamed Shehata, Armin Eberlein, Abraham O. Fapoju...
CSI
2007
96views more  CSI 2007»
14 years 9 months ago
A common criteria based security requirements engineering process for the development of secure information systems
In order to develop security critical Information Systems, specifying security quality requirements is vitally important, although it is a very difficult task. Fortunately, there ...
Daniel Mellado, Eduardo Fernández-Medina, M...
FGCS
2006
83views more  FGCS 2006»
14 years 9 months ago
Memory-efficient Kronecker algorithms with applications to the modelling of parallel systems
We present a new algorithm for computing the solution of large Markov chain models whose generators can be represented in the form of a generalized tensor algebra, such as network...
Anne Benoit, Brigitte Plateau, William J. Stewart
SCL
2008
95views more  SCL 2008»
14 years 9 months ago
Performance bounds in linear control of unstable MIMO systems with pole location constraint
This paper proposes a methodology to compute quadratic performance bounds when the closed loop poles of a discrete-time multivariable control loop are confined to a disk, centred ...
Andrés A. Peters, Mario E. Salgado, Eduardo...
IJON
2007
116views more  IJON 2007»
14 years 9 months ago
Criticality of lateral inhibition for edge enhancement in neural systems
Although the role of lateral inhibition in edge (contrast) enhancement is well known, it has not been parametrized. This paper investigates the imbalance between the lateral inhib...
Pradeep Arkachar, Meghanad D. Wagh