Sciweavers

368 search results - page 10 / 74
» System BV is NP-complete
Sort
View
90
Voted
CN
2007
64views more  CN 2007»
15 years 16 days ago
A taxonomy for identifying requirement interactions in software systems
This paper presents an interaction taxonomy for classifying and identifying requirement interactions in software systems. The proposed taxonomy is in the form of a four-layered py...
Mohamed Shehata, Armin Eberlein, Abraham O. Fapoju...
111
Voted
CSI
2007
96views more  CSI 2007»
15 years 16 days ago
A common criteria based security requirements engineering process for the development of secure information systems
In order to develop security critical Information Systems, specifying security quality requirements is vitally important, although it is a very difficult task. Fortunately, there ...
Daniel Mellado, Eduardo Fernández-Medina, M...
83
Voted
FGCS
2006
83views more  FGCS 2006»
15 years 17 days ago
Memory-efficient Kronecker algorithms with applications to the modelling of parallel systems
We present a new algorithm for computing the solution of large Markov chain models whose generators can be represented in the form of a generalized tensor algebra, such as network...
Anne Benoit, Brigitte Plateau, William J. Stewart
83
Voted
SCL
2008
95views more  SCL 2008»
15 years 14 days ago
Performance bounds in linear control of unstable MIMO systems with pole location constraint
This paper proposes a methodology to compute quadratic performance bounds when the closed loop poles of a discrete-time multivariable control loop are confined to a disk, centred ...
Andrés A. Peters, Mario E. Salgado, Eduardo...
89
Voted
IJON
2007
116views more  IJON 2007»
15 years 14 days ago
Criticality of lateral inhibition for edge enhancement in neural systems
Although the role of lateral inhibition in edge (contrast) enhancement is well known, it has not been parametrized. This paper investigates the imbalance between the lateral inhib...
Pradeep Arkachar, Meghanad D. Wagh