Sciweavers

1308 search results - page 120 / 262
» Application of Hazard Analysis to Software Quality Modelling
Sort
View
148
Voted
ECMDAFA
2009
Springer
138views Hardware» more  ECMDAFA 2009»
15 years 10 months ago
A Pattern Mining Approach Using QVT
Model Driven Software Development (MDSD) has matured over the last few years and is now becoming an established technology. Models are used in various contexts, where the possibili...
Jens Kübler, Thomas Goldschmidt
156
Voted
DCOSS
2005
Springer
15 years 9 months ago
Analysis of Target Detection Performance for Wireless Sensor Networks
In surveillance and tracking applications, wireless sensor nodes collectively monitor the existence of intruding targets. In this paper, we derive closed form results for predicti...
Qing Cao, Ting Yan, John A. Stankovic, Tarek F. Ab...
131
Voted
CODES
2007
IEEE
15 years 10 months ago
Locality optimization in wireless applications
There is a strong need now for compilers of embedded systems to find effective ways of optimizing series of loop-nests, wherein majority of the memory references occur in the fo...
Javed Absar, Min Li, Praveen Raghavan, Andy Lambre...
116
Voted
AOSE
2005
Springer
15 years 9 months ago
Requirements Elicitation for Agent-Based Applications
Requirements elicitation for a software system is a key stage in a successful development. At the same time, it is one of the most challenging, because requirements have to conside...
Rubén Fuentes, Jorge J. Gómez-Sanz, ...
WSC
2008
15 years 6 months ago
Simulation of modular building construction
Modular construction has the advantage of producing structures quickly and efficiently, while not requiring the resources to build a structure to be co-located with the constructi...
Osama M. Mohsen, Paul J. Knytl, Basel Abdulaal, Ja...