Sciweavers

16216 search results - page 51 / 3244
» Effective Modeling with Constraints
Sort
View
147
Voted
APSEC
2006
IEEE
15 years 10 months ago
Interaction Testing in Model-Based Development: Effect on Model-Coverage
Model-based software development is gaining interest in domains such as avionics, space, and automotives. The model serves as the central artifact for the development efforts (suc...
Renée C. Bryce, Ajitha Rajan, Mats Per Erik...
CAV
2004
Springer
128views Hardware» more  CAV 2004»
15 years 9 months ago
Proving More Properties with Bounded Model Checking
Bounded Model Checking, although complete in theory, has been thus far limited in practice to falsification of properties that were not invariants. In this paper we propose a term...
Mohammad Awedh, Fabio Somenzi
ICASSP
2011
IEEE
14 years 7 months ago
Directions-of-arrival estimation using a sparse spatial spectrum model with uncertainty
This paper is concerned with the estimation of the directionsof-arrival (DOA) of narrowband sources using a sparse spatial spectral model, when the model itself is not precise. Wh...
Jimeng Zheng, Mostafa Kaveh
ICMCS
1996
IEEE
123views Multimedia» more  ICMCS 1996»
15 years 8 months ago
Dynamic QoS Control Based on the QoS-Ticket Model
The most notable characteristic of continuous-media data is the existence of timing constraints. To handle such data appropriately, some system support for resource management and...
Kiyokuni Kawachiya, Hideyuki Tokuda
140
Voted
IFIP
2009
Springer
15 years 1 months ago
Model Checking of Security-Sensitive Business Processes
Security-sensitive business processes are business processes that must comply with security requirements (e.g. authorization constraints). In previous works it has been shown that ...
Alessandro Armando, Serena Elisa Ponta