Sciweavers

1352 search results - page 174 / 271
» Designing Security Requirements Models Through Planning
Sort
View
WICSA
2008
13 years 10 months ago
Towards a Formal Model for Reconfigurable Software Architectures by Bigraphs
With the spread of the Internet and software evolution in complex intensive systems, software architecture often need be reconfigured during runtime to adapt variable environments...
Zhiming Chang, XinJun Mao, Zhichang Qi
CN
2004
129views more  CN 2004»
13 years 8 months ago
Dynamic traffic controls for Web-server networks
Distributed Web-server systems have been widely used to provide effective Internet services. The management of these systems requires dynamic controls of the Web traffic. With the...
Liming Liu, Yumao Lu
IJRR
2010
113views more  IJRR 2010»
13 years 7 months ago
On the Topology of Discrete Strategies
This paper explores a topological perspective of planning in the presence of uncertainty, focusing on tasks specified by goal states in discrete spaces. The paper introduces stra...
Michael Erdmann
MTDT
2003
IEEE
164views Hardware» more  MTDT 2003»
14 years 2 months ago
Applying Defect-Based Test to Embedded Memories in a COT Model
ct Defect-based testing for digital logic concentrates primarily on methods of test application, including for example at-speed structural tests and IDDQ testing. In contrast, defe...
Robert C. Aitken
SIGCSE
2002
ACM
134views Education» more  SIGCSE 2002»
13 years 8 months ago
Internationalization of the curriculum report of a project within computer science
In the Fall of 1999 the Center for Excellence in Undergraduate Teaching (CEUT) and the International Office at Virginia Tech provided a small grant to support the incorporation of...
John A. N. Lee