Sciweavers

1968 search results - page 122 / 394
» The Complexity of Valued Constraint Models
Sort
View
106
Voted
CONCUR
2009
Springer
15 years 8 months ago
Query-Based Model Checking of Ad Hoc Network Protocols
Abstract. A prominent source of complexity in the verification of ad hoc network (AHN) protocols is the fact that the number of network topologies grows exponentially with the squ...
Anu Singh, C. R. Ramakrishnan, Scott A. Smolka
QOSA
2007
Springer
15 years 7 months ago
A Bayesian Model for Predicting Reliability of Software Systems at the Architectural Level
: Modern society relies heavily on complex software systems for everyday activities. Dependability of these systems thus has become a critical feature that determines which product...
Roshanak Roshandel, Nenad Medvidovic, Leana Golubc...
AGENTCL
2000
Springer
15 years 6 months ago
Using Colored Petri Nets for Conversation Modeling
Conversations are a useful means of structuring communicative interactions among agents. The value of a conversation-based approach is largely determined by the conversational mod...
R. Scott Cost, Ye Chen, Timothy W. Finin, Yannis L...
IRMA
2000
15 years 2 months ago
EMC - A modeling method for developing web-based applications
Early information systems were mainly built around secondary, administrative processes of the value chain (e.g. accounting). But since the internet came into use, more and more pr...
Peter Rittgen
ICECCS
1995
IEEE
114views Hardware» more  ICECCS 1995»
15 years 5 months ago
The role of secondary attributes in formal object modelling
When modelling a large and complex system, clarzty of the speczfication becomes an znaportant factor. I n object-oriented specification, the states of individual objects are captu...
Jin Song Dong, Gordon A. Rose, Roger Duke