Sciweavers

2845 search results - page 336 / 569
» Constraints over Ontologies
Sort
View
CCGRID
2006
IEEE
14 years 4 months ago
SAHA: A Scheduling Algorithm for Security-Sensitive Jobs on Data Grids
Security-sensitive applications that access and generate large data sets are emerging in various areas such as bioinformatics and high energy physics. Data grids provide data-inte...
Tao Xie 0004, Xiao Qin
ECBS
2006
IEEE
166views Hardware» more  ECBS 2006»
14 years 4 months ago
Model Transformations in the Model-Based Development of Real-time Systems
In this paper we argue for UML-based metamodeling and pattern-based graph transformation techniques in computer-based systems development through an illustrative example from the ...
Tivadar Szemethy, Gabor Karsai, Daniel Balasubrama...
ETFA
2006
IEEE
14 years 4 months ago
Robust Fault Isolation Filter Design for Networked Control Systems
In this paper, the effect of network-induced delay introduced into the control loop is modelled as time-varying disturbance. Based on this model, a fault isolation filter (FIF) f...
Shanbin Li, Dominique Sauter, Christophe Aubrun
HICSS
2006
IEEE
121views Biometrics» more  HICSS 2006»
14 years 4 months ago
Enterprise Architecture: A Social Network Perspective
IS Architecture emerges as a result of a sequence of IS project implementations. The architecture that emerges can be viewed as a network of software components linked by their in...
David Dreyfus, Bala Iyer
HICSS
2006
IEEE
120views Biometrics» more  HICSS 2006»
14 years 4 months ago
Reconciling the Irreconcilable? A Software Development Approach that Combines Agile with Formal
Unstable software requirements are common and call for Agile practices. On the other hand, quality standards and recommendations, to which companies must adhere to play in selecte...
José Gonçalo A. Oliveira Basto da Si...