Sciweavers

1976 search results - page 271 / 396
» Application Semiotics Engineering Process
Sort
View
TASE
2007
IEEE
14 years 3 months ago
Constraint-Based Policy Negotiation and Enforcement for Telco Services
Telco services are evolving under several aspects: for instance, services may combine different telecommunication features (messaging, multi-media, etc.) and may be activated and...
Maria Grazia Buscemi, Laura Ferrari, Corrado Moiso...
FASE
2007
Springer
14 years 3 months ago
EQ-Mine: Predicting Short-Term Defects for Software Evolution
We use 63 features extracted from sources such as versioning and issue tracking systems to predict defects in short time frames of two months. Our multivariate approach covers aspe...
Jacek Ratzinger, Martin Pinzger, Harald Gall
SAFECOMP
2007
Springer
14 years 3 months ago
Using Deductive Cause-Consequence Analysis (DCCA) with SCADE
Abstract. Esterel Technologies’ SCADE Suite is one of the most important development tools for software for safety-critical systems. It is used for designing many critical compon...
Matthias Güdemann, Frank Ortmeier, Wolfgang R...
WER
2007
Springer
14 years 3 months ago
A Strategy for Information Source Identification
Eliciting requirements is well known to be a difficult task. Several strategies exist that makes it possible to elicit information from different information sources. These strate...
Julio Cesar Sampaio do Prado Leite, Edson Andrade ...
CCECE
2006
IEEE
14 years 3 months ago
Low-Voltage Low-Power Low-Noise Amplifier for Wireless Sensor Networks
—This work presents a methodology for designing CMOS low-voltage low-power low-noise amplifiers (LNAs) based on the inductively degenerated common-source topology. To demonstrate...
Derek Ho, Shahriar Mirabbasi