Sciweavers

17789 search results - page 63 / 3558
» Exceptional Use Cases
Sort
View
ANSOFT
2002
111views more  ANSOFT 2002»
13 years 7 months ago
Using UML Profiles for Documenting Web-Based Application Frameworks
Abstract. The Web now offers an exceptional infrastructure for the development of distributed collaborative services and applications. However, most of the existing applications on...
Lidia Fuentes, José M. Troya, Antonio Valle...
CLEIEJ
2010
13 years 5 months ago
Incorporation of Kinesthetic Learning Activities to Computer Science 1 course: Use and Results
In this work, we present the systematic incorporation of Kinesthetic Learning Activities (activities with movements and sensations), into the Computer Science 1 course. We detail ...
Inés Friss de Kereki
MATES
2007
Springer
14 years 1 months ago
Using DESs for Temporal Diagnosis of Multi-agent Plan Execution
The most common reason for plan repair are the violation of a plan’s temporal constraints. Air Traffic Control is an example of an area in which violations of the plan’s tempo...
Femke de Jonge, Nico Roos, Huib Aldewereld
CIS
2004
Springer
14 years 1 months ago
Representation of the Signal Transduction with Aberrance Using Ipi Calculus
The pi calculus has been applied to modelling biochemical networks. In these applications, the modelling is done without considerations to exceptions. The Ipi calculus, the Interfe...
Min Zhang, Guoqiang Li, Yuxi Fu, Zhizhou Zhang, Li...
CRYPTO
1994
Springer
128views Cryptology» more  CRYPTO 1994»
13 years 12 months ago
Linear Cryptanalysis Using Multiple Approximations
We present a technique which aids in the linear cryptanalysis of a block cipher and allows for a reduction in the amount of data required for a successful attack. We note the limit...
Burton S. Kaliski Jr., Matthew J. B. Robshaw