Sciweavers

225 search results - page 9 / 45
» Analysis of set-up time models: A metric perspective
Sort
View
ICSE
2004
IEEE-ACM
14 years 8 months ago
Elaborating Security Requirements by Construction of Intentional Anti-Models
Caring for security at requirements engineering time is a message that has finally received some attention recently. However, it is not yet very clear how to achieve this systemat...
Axel van Lamsweerde
PE
2008
Springer
106views Optimization» more  PE 2008»
13 years 8 months ago
Heavy traffic analysis of polling models by mean value analysis
In this paper we present a new approach to derive heavy-traffic asymptotics for polling models. We consider the classical cyclic polling model with exhaustive or gated service at ...
Robert D. van der Mei, Erik M. M. Winands
LREC
2010
144views Education» more  LREC 2010»
13 years 10 months ago
Evaluating Complex Semantic Artifacts
Evaluating complex Natural Language Processing (NLP) systems can prove extremely difficult. In many cases, the best one can do is to evaluate these systems indirectly, by looking ...
Christopher R. Walker, Hannah Copperman
ICRA
2002
IEEE
84views Robotics» more  ICRA 2002»
14 years 1 months ago
Queueing Network Modeling and Lead Time Compression of Electronic Procurement
Abstract- Procurement, i.e., the process of obtaining materials or services and managing their inflow into organizations, is a critical process in supply chain management. Internet...
C. V. L. Raju, Y. Narahari
QEST
2007
IEEE
14 years 2 months ago
A Performance Analysis Tool for Scenario-Aware Streaming Applications
Dataflow models are often used for analysing streaming applications. The recently introduced scenario-aware extension of the synchronous dataflow model can capture the dynamism ...
Bart D. Theelen