Sciweavers

2317 search results - page 367 / 464
» DMVIS: Design, Modelling and Validation of Interactive Syste...
Sort
View
142
Voted
CEC
2011
IEEE
14 years 3 months ago
Towards human-like social multi-agents with memetic automaton
Abstract—Memetics is a new science that has attracted increasing attentions in the recent decades. Beyond the formalism of simple hybrids, adaptive hybrids and memetic algorithms...
Liang Feng, Yew-Soon Ong, Ah-Hwee Tan, Xianshun Ch...
142
Voted
TCBB
2008
137views more  TCBB 2008»
15 years 3 months ago
Toward Verified Biological Models
The last several decades have witnessed a vast accumulation of biological data and data analysis. Many of these data sets represent only a small fraction of the system's behav...
Avital Sadot, Jasmin Fisher, Dan Barak, Yishai Adm...
183
Voted
FASE
2008
Springer
15 years 5 months ago
Automated Analysis of Permission-Based Security Using UMLsec
Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...
Jan Jürjens, Jörg Schreck, Yijun Yu
186
Voted
MOBIHOC
2005
ACM
16 years 3 months ago
Power balanced coverage-time optimization for clustered wireless sensor networks
We consider a wireless sensor network in which sensors are grouped into clusters, each with its own cluster head (CH). Each CH collects data from sensors in its cluster and relays...
Tao Shu, Marwan Krunz, Sarma B. K. Vrudhula
JUCS
2008
161views more  JUCS 2008»
15 years 3 months ago
A Model-Driven Approach to Align Business Processes with User Interfaces
: Information Technology (IT) has evolved over time from its traditional use as administrative support towards a more strategic role to enforce business processes (BP). But several...
Kênia Soares Sousa, Hildeberto Mendonç...