Sciweavers

4895 search results - page 847 / 979
» Tools for Grammar Engineering
Sort
View
TACAS
1998
Springer
98views Algorithms» more  TACAS 1998»
15 years 2 months ago
Efficient Modeling of Memory Arrays in Symbolic Ternary Simulation
This paper enables symbolic ternary simulation of systems with large embedded memories. Each memory array is replaced with a behavioral model, where the number of symbolic variable...
Miroslav N. Velev, Randal E. Bryant
UML
1998
Springer
15 years 2 months ago
Automating the Synthesis of UML StateChart Diagrams from Multiple Collaboration Diagrams
The use of scenarios has become a popular technique for requirements elicitation and specification building. Since scenarios capture only partial descriptions of system behavior, ...
Ismaïl Khriss, Mohammed Elkoutbi, Rudolf K. K...
78
Voted
ICDE
1993
IEEE
116views Database» more  ICDE 1993»
15 years 2 months ago
The Volcano Optimizer Generator: Extensibility and Efficient Search
Emerging database application domains demand not only new functionality but also high performance. To satisfy these two requirements, the Volcano project provides efficient, exten...
Goetz Graefe, William J. McKenna
INFOCOM
1994
IEEE
15 years 2 months ago
Traffic Models for Wireless Communication Networks
In this paper, we introduce a deterministic fluid model and two stochastic traffic models for wireless networks. The setting is a highway with multiple entrances and exits. Vehicl...
Kin K. Leung, William A. Massey, Ward Whitt
CHIMIT
2007
ACM
15 years 2 months ago
Looking for trouble: understanding end-user security management
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Joshua B. Gross, Mary Beth Rosson