Sciweavers

319 search results - page 46 / 64
» Defining Requirements for an Incident Management System: A C...
Sort
View
KDD
2008
ACM
224views Data Mining» more  KDD 2008»
14 years 8 months ago
The structure of information pathways in a social communication network
Social networks are of interest to researchers in part because they are thought to mediate the flow of information in communities and organizations. Here we study the temporal dyn...
Gueorgi Kossinets, Jon M. Kleinberg, Duncan J. Wat...
TC
2008
13 years 7 months ago
Implementing Synchronous Models on Loosely Time Triggered Architectures
Synchronous systems offer clean semantics and an easy verification path at the expense of often inefficient implementations. Capturing design specifications as synchronous models a...
Stavros Tripakis, Claudio Pinello, Albert Benvenis...
CCS
2004
ACM
14 years 1 months ago
MAC and UML for secure software design
Security must be a first class citizen in the design of large scale, interacting, software applications, at early and all stages of the lifecycle, for accurate and precise policy ...
Thuong Doan, Steven A. Demurjian, T. C. Ting, Andr...
MKM
2005
Springer
14 years 1 months ago
Computational Origami of a Morley's Triangle
Abstract. We present a computational origami construction of Morley’s triangles and automated proof of correctness of the generalized Morley’s theorem in a streamlined process ...
Tetsuo Ida, Hidekazu Takahashi, Mircea Marin
WSC
2007
13 years 10 months ago
Stability analysis of the supply chain by using neural networks and genetic algorithms
Effectively managing a supply chain requires visibility to detect unexpected variations in the dynamics of the supply chain environment at an early stage. This paper proposes a me...
Alfonso Sarmiento, Luis Rabelo, Ramamoorthy Lakkoj...