Sciweavers

529 search results - page 79 / 106
» Causal Time Calculus
Sort
View
APN
2006
Springer
13 years 11 months ago
Can I Execute My Scenario in Your Net? VipTool Tells You!
This paper describes the verification module (the VipVerify Module) of the VipTool [4]. VipVerify allows to verify whether a given scenario is an execution of a system model, given...
Robin Bergenthum, Jörg Desel, Gabriel Juh&aac...
NGC
2000
Springer
13 years 11 months ago
Policies for using replica groups and their effectiveness over the Internet
Replication is known to offer high availability in the presence of failures. This paper considers the case of a client making invocations on a group of replicated servers. It iden...
G. Morgan, P. D. Ezilchelvan
WSC
2007
13 years 10 months ago
Effective workforce lifecycle management via system dynamics modeling and simulation
Efficiently planning and managing workforce is a challenge imposed on many companies, especially for those in the service industry. The target of an effective workforce management...
Lianjun An, Jun-Jang Jeng, Young M. Lee, Changrui ...
ITS
2010
Springer
145views Multimedia» more  ITS 2010»
13 years 9 months ago
Predictors of Transfer of Experimental Design Skills in Elementary and Middle School Children
A vital goal of instruction is to enable learners to transfer acquired knowledge to appropriate future situations. For elementary school children in middle-high-SES schools, “exp...
Stephanie Siler, David Klahr, Cressida Magaro, Kev...
EMS
2008
IEEE
13 years 9 months ago
Threat Modeling Revisited: Improving Expressiveness of Attack
Threat modeling plays an important role in the deployment of optimal security controls and a number of threat modeling techniques have been proposed. However, most of the existing...
Drake Patrick Mirembe, Maybin K. Muyeba