Sciweavers

1532 search results - page 58 / 307
» An analysis of additivity in OLAP systems
Sort
View
SEKE
2005
Springer
14 years 2 months ago
Using Feature-Oriented Analysis to Recover Legacy Software Design for Software Evolution
Most design recovery approaches start from analysing source code. Nonetheless, it is very difficult to get adequate design information only depending on source code. Additional av...
Shaoyun Li, Feng Chen, Zhihong Liang, Hongji Yang
ECRTS
2002
IEEE
14 years 1 months ago
Scope-Tree: A Program Representation for Symbolic Worst-Case Execution Time Analysis
Most WCET analysis techniques only provide an upper bound on the worst case execution time as a constant value. However, it often appears that the execution time of a piece of cod...
Antoine Colin, Guillem Bernat
TSE
2008
107views more  TSE 2008»
13 years 9 months ago
Security Requirements Engineering: A Framework for Representation and Analysis
This paper presents a framework for security requirements elicitation and analysis. The framework is based on constructing a context for the system, representing security requireme...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...
ICVS
2009
Springer
14 years 3 months ago
Real-Time Traversable Surface Detection by Colour Space Fusion and Temporal Analysis
Abstract. We present a real-time approach for traversable surface detection using a low-cost monocular camera mounted on an autonomous vehicle. The proposed methodology extracts co...
Ioannis Katramados, Steve Crumpler, Toby P. Brecko...
ACSD
2005
IEEE
71views Hardware» more  ACSD 2005»
14 years 2 months ago
Maximal Causality Analysis
Perfectly synchronous systems immediately react to the inputs of their environment, which may lead to so-called causality cycles between actions and their trigger conditions. Algo...
Klaus Schneider, Jens Brandt, Tobias Schüle, ...