Sciweavers

2163 search results - page 63 / 433
» cases 2004
Sort
View
PTS
2004
86views Hardware» more  PTS 2004»
14 years 11 months ago
From Safety Verification to Safety Testing
A methodology that combines verification and conformance testing for validating safety requirements of reactive systems is presented. The requirements are first automatically verif...
Vlad Rusu, Hervé Marchand, Valéry Ts...
IASSE
2004
14 years 11 months ago
Execution of A Requirement Model in Software Development
Latest research results have shown that requirements errors have a prolonged impact on software development and that they are more expensive to fix during later stages than early ...
Wuwei Shen, Mohsen Guizani, Zijiang Yang, Kevin J....
ECIS
2001
14 years 11 months ago
The Articulation of Shared Meaning in Information Systems Development
This paper presents a case study showing how Repertory Grid Analysis (RGA) can be used to construct shared meaning during information systems development, implementation and use. ...
Christopher J. Davis
COCO
2004
Springer
86views Algorithms» more  COCO 2004»
15 years 3 months ago
Deterministic Polynomial Identity Testing in Non-Commutative Models
We give a deterministic polynomial time algorithm for polynomial identity testing in the following two cases:
Ran Raz, Amir Shpilka
COMBINATORICS
2004
99views more  COMBINATORICS 2004»
14 years 9 months ago
A Scaling Result for Explosive Processes
We consider the asymptotic behavior of the following model: balls are sequentially thrown into bins so that the probability that a bin with n balls obtains the next ball is propor...
Michael Mitzenmacher, Roberto Imbuzeiro Oliveira, ...