Sciweavers

1098 search results - page 151 / 220
» Combining Models for Business Decisions and Software Develop...
Sort
View
118
Voted
ADVAI
2010
110views more  ADVAI 2010»
14 years 10 months ago
Using Genetic Algorithms to Represent Higher-Level Planning in Simulation Models of Conflict
The focus of warfare has shifted from the Industrial Age to the Information Age, as encapsulated by the term Network Enabled Capability. This emphasises information sharing, comma...
James Moffat, Susan Fellows
146
Voted
SCAM
2003
IEEE
15 years 9 months ago
Unique Renaming of Java Using Source Transformation
This paper presents a flexible way in which a deisgn model extracted from Java programs can remain unified with the source code. Each entity declaration and reference in the Java ...
Xinping Guo, James R. Cordy, Thomas R. Dean
ICSE
2008
IEEE-ACM
16 years 4 months ago
Calysto: scalable and precise extended static checking
Automatically detecting bugs in programs has been a long-held goal in software engineering. Many techniques exist, trading-off varying levels of automation, thoroughness of covera...
Domagoj Babic, Alan J. Hu
RSCTC
2004
Springer
164views Fuzzy Logic» more  RSCTC 2004»
15 years 9 months ago
Rough Set Methodology in Clinical Practice: Controlled Hospital Trial of the MET System
Abstract. Acute abdominal pain in childhood is a common but diagnostically challenging problem facing Emergency Department personnel. Experienced physicians use a combination of ke...
Ken Farion, Wojtek Michalowski, Roman Slowinski, S...
SOFSEM
2010
Springer
16 years 18 days ago
Practically Applicable Formal Methods
Abstract. Formal methods are considered to be highly expensive. Therefore, they are currently applied almost only in high risk software development. In this paper, we show that for...
Jedrzej Fulara, Krzysztof Jakubczyk