Sciweavers

575 search results - page 25 / 115
» A Trust Analysis Methodology for Pervasive Computing Systems
Sort
View
SETP
2007
13 years 9 months ago
Using Communication Objects During Requirements Analysis
Requirement analysis continues to be one of the most critical and challenging phases during the software development process. Many object-oriented methodologies identify three pri...
Peter J. Clarke, Yingbo Wang, Tuan L. Cameron, Yal...
PERVASIVE
2007
Springer
14 years 1 months ago
Using Ground Reaction Forces from Gait Analysis: Body Mass as a Weak Biometric
Ground reaction forces generated during normal walking have recently been used to identify and/or classify individuals based upon the pattern of the forces observed over time. One ...
Jam Jenkins, Carla Schlatter Ellis
IEEEICCI
2002
IEEE
14 years 18 days ago
A Framework for Object Identification and Refinement Process in Object-Oriented Analysis and Design
There are already many projects focusing on Computer Aided Software Engineering (CASE) tools for object-oriented analysis and design. However, at this moment, there are certain li...
Romi S. Wahono, Behrouz H. Far
SIGMETRICS
2002
ACM
142views Hardware» more  SIGMETRICS 2002»
13 years 7 months ago
Exact aggregate solutions for M/G/1-type Markov processes
We introduce a new methodology for the exact analysis of M/G/1-type Markov processes. The methodology uses basic, well-known results for Markov chains by exploiting the structure ...
Alma Riska, Evgenia Smirni
COMPSAC
2007
IEEE
13 years 11 months ago
Infrastructure Hardening: A Competitive Coevolutionary Methodology Inspired by Neo-Darwinian Arms Races
The world is increasingly dependent on critical infrastructures such as the electric power grid, water, gas, and oil transport systems, which are susceptible to cascading failures...
Travis C. Service, Daniel R. Tauritz, William M. S...