Sciweavers

748 search results - page 83 / 150
» Applying WinWin to Quality Requirements: A Case Study
Sort
View
BCS
2008
13 years 10 months ago
Provenance-Based Auditing of Private Data Use
Across the world, organizations are required to comply with regulatory frameworks dictating how to manage personal information. Despite these, several cases of data leaks and expo...
Rocío Aldeco-Pérez, Luc Moreau
CEC
2007
IEEE
13 years 9 months ago
Entropy-based Memetic Particle Swarm Optimization for computing periodic orbits of nonlinear mappings
— The computation of periodic orbits of nonlinear mappings is very important for studying and better understanding the dynamics of complex systems. Evolutionary algorithms have s...
Y. G. Petalas, Konstantinos E. Parsopoulos, Michae...
JSYML
2008
72views more  JSYML 2008»
13 years 8 months ago
Perfect trees and elementary embeddings
An important technique in large cardinal set theory is that of extending an elementary embedding j : M N between inner models to an elementary embedding j : M[G] N[G] between ge...
Sy-David Friedman, Katherine Thompson
QOSA
2010
Springer
14 years 26 days ago
Statistical Inference of Software Performance Models for Parametric Performance Completions
Software performance engineering (SPE) enables software architects to ensure high performance standards for their applications. However, applying SPE in practice is still challengi...
Jens Happe, Dennis Westermann, Kai Sachs, Lucia Ka...
OOPSLA
2000
Springer
14 years 14 days ago
Finding refactorings via change metrics
Reverse engineering is the process of uncovering the design and the design rationale from a functioning software system. Reverse engineering is an integral part of any successful ...
Serge Demeyer, Stéphane Ducasse, Oscar Nier...