Sciweavers

683 search results - page 112 / 137
» Vulnerability Analysis of High Dimensional Complex Systems
Sort
View
126
Voted
CD
2005
Springer
15 years 6 months ago
Modelling Deployment Using Feature Descriptions and State Models for Component-Based Software Product Families
Abstract. Products within a product family are composed of different component configurations where components have different variable features and a large amount of dependency re...
Slinger Jansen, Sjaak Brinkkemper
117
Voted
APSCC
2009
IEEE
15 years 5 months ago
Model driven approach to Service oriented Enterprise Architecture
Enterprise Architecture (EA) has become an important means to acquire and maintain knowledge about the structure and behavior of the enterprises and to develop the required IT sys...
Sedigheh Khoshnevis, Fereidoon Shams Aliee, Pooyan...
109
Voted
DAC
2009
ACM
15 years 4 months ago
Reduction techniques for synchronous dataflow graphs
The Synchronous Dataflow (SDF) model of computation is popular for modelling the timing behaviour of real-time embedded hardware and software systems and applications. It is an es...
Marc Geilen
96
Voted
SPAA
2006
ACM
15 years 6 months ago
Towards a scalable and robust DHT
The problem of scalable and robust distributed data storage has recently attracted a lot of attention. A common approach in the area of peer-to-peer systems has been to use a dist...
Baruch Awerbuch, Christian Scheideler
BMCBI
2005
122views more  BMCBI 2005»
15 years 20 days ago
FACT - a framework for the functional interpretation of high-throughput experiments
Background: Interpreting the results of high-throughput experiments, such as those obtained from DNA-microarrays, is an often time-consuming task due to the high number of data-po...
Felix Kokocinski, Nicolas Delhomme, Gunnar Wrobel,...