Sciweavers

2317 search results - page 367 / 464
» DMVIS: Design, Modelling and Validation of Interactive Syste...
Sort
View
CEC
2011
IEEE
12 years 8 months ago
Towards human-like social multi-agents with memetic automaton
Abstract—Memetics is a new science that has attracted increasing attentions in the recent decades. Beyond the formalism of simple hybrids, adaptive hybrids and memetic algorithms...
Liang Feng, Yew-Soon Ong, Ah-Hwee Tan, Xianshun Ch...
TCBB
2008
137views more  TCBB 2008»
13 years 8 months ago
Toward Verified Biological Models
The last several decades have witnessed a vast accumulation of biological data and data analysis. Many of these data sets represent only a small fraction of the system's behav...
Avital Sadot, Jasmin Fisher, Dan Barak, Yishai Adm...
FASE
2008
Springer
13 years 10 months ago
Automated Analysis of Permission-Based Security Using UMLsec
Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...
Jan Jürjens, Jörg Schreck, Yijun Yu
MOBIHOC
2005
ACM
14 years 7 months ago
Power balanced coverage-time optimization for clustered wireless sensor networks
We consider a wireless sensor network in which sensors are grouped into clusters, each with its own cluster head (CH). Each CH collects data from sensors in its cluster and relays...
Tao Shu, Marwan Krunz, Sarma B. K. Vrudhula
JUCS
2008
161views more  JUCS 2008»
13 years 8 months ago
A Model-Driven Approach to Align Business Processes with User Interfaces
: Information Technology (IT) has evolved over time from its traditional use as administrative support towards a more strategic role to enforce business processes (BP). But several...
Kênia Soares Sousa, Hildeberto Mendonç...