Sciweavers

3792 search results - page 702 / 759
» Techniques for Trusted Software Engineering
Sort
View
REFSQ
2007
Springer
15 years 6 months ago
Optimal-Constraint Lexicons for Requirements Specifications
Abstract. Constrained Natural Languages (CNLs) are becoming an increasingly popular way of writing technical documents such as requirements specifications. This is because CNLs aim...
Stephen Boyd, Didar Zowghi, Vincenzo Gervasi
91
Voted
COMSWARE
2006
IEEE
15 years 6 months ago
Utilizing network features for privacy violation detection
Privacy, its violations and techniques to circumvent privacy violation have grabbed the centre-stage of both academia and industry in recent months. Corporations worldwide have be...
Jaijit Bhattacharya, Rajanish Dass, Vishal Kapoor,...
COMSWARE
2006
IEEE
15 years 6 months ago
Spread-based heuristic for sensor selection in sensor networks
In this paper we propose a method for selecting an appropriate subset of sensors with a view to minimize estimation error while tracking a target with sensors spread across in a 2...
Vaishali P. Sadaphal, Bijendra N. Jain
DATE
2006
IEEE
125views Hardware» more  DATE 2006»
15 years 6 months ago
Formal performance analysis and simulation of UML/SysML models for ESL design
UML2 and SysML try to adopt techniques known from software development to systems engineering. However, the focus has been put on modeling aspects until now and quantitative perfo...
Alexander Viehl, Timo Schönwald, Oliver Bring...
98
Voted
ICAS
2006
IEEE
128views Robotics» more  ICAS 2006»
15 years 6 months ago
The AML Approach to Modeling Autonomic Systems
Autonomic systems are typically distributed, complex and concurrent systems, comprised of multiple interacting autonomic elements that often exhibit emergent behavior. Design and ...
Radovan Cervenka, Dominic A. P. Greenwood, Ivan Tr...