Sciweavers

1620 search results - page 147 / 324
» Use Case Level Pointcuts
Sort
View
ISI
2006
Springer
15 years 3 months ago
On the Topology of the Dark Web of Terrorist Groups
In recent years, terrorist groups have used the WWW to spread their ideologies, disseminate propaganda, and recruit members. Studying the terrorist websites may help us understand ...
Jennifer Jie Xu, Hsinchun Chen, Yilu Zhou, Jialun ...
MSWIM
2005
ACM
15 years 9 months ago
Latency-sensitive power control for wireless ad-hoc networks
We investigate the impact of power control on latency in wireless ad-hoc networks. If transmission power is increased, interference increases, thus reducing network capacity. A no...
Mohamed R. Fouad, Sonia Fahmy, Gopal Pandurangan
ATVA
2007
Springer
136views Hardware» more  ATVA 2007»
15 years 9 months ago
Symbolic Fault Tree Analysis for Reactive Systems
Fault tree analysis is a traditional and well-established technique for analyzing system design and robustness. Its purpose is to identify sets of basic events, called cut sets, wh...
Marco Bozzano, Alessandro Cimatti, Francesco Tappa...
DSRT
2005
IEEE
15 years 9 months ago
Investigating Distributed Simulation at The Ford Motor Company
Engine production is a complex process that requires the manufacturing and assembly of a wide variety of components to create a varied product mix. Simulation plays a key role in ...
Simon J. E. Taylor, Leif Bohli, Xiaoguang Wang, St...
SEKE
2005
Springer
15 years 8 months ago
Application of Design Combinatorial Theory to Scenario-Based Software Architecture Analysis
Design combinatorial theory for test-case generation has been used successfully in the past. It is useful in optimizing test cases as it is practically impossible to exhaustively t...
Chung-Horng Lung, Marzia Zaman