Sciweavers

182 search results - page 23 / 37
» Ludo: A Case Study for Graph Transformation Tools
Sort
View
WINET
2010
112views more  WINET 2010»
13 years 6 months ago
On routing with guaranteed delivery in three-dimensional ad hoc wireless networks
We study routing algorithms for three-dimensional ad hoc networks that guarantee delivery and are k-local, i.e., each intermediate node v’s routing decision only depends on knowl...
Stephane Durocher, David G. Kirkpatrick, Lata Nara...
IEE
2008
108views more  IEE 2008»
13 years 7 months ago
Mining execution relations for crosscutting concerns
Aspect mining tries to identify crosscutting concerns in the code of existing systems and thus supports their adaption to an aspect-oriented design. A semi-automatic static aspect...
Jens Krinke
ICDE
2008
IEEE
114views Database» more  ICDE 2008»
14 years 9 months ago
On Unifying Privacy and Uncertain Data Models
The problem of privacy-preserving data mining has been studied extensively in recent years because of the increased amount of personal information which is available to corporation...
Charu C. Aggarwal
ICFEM
2004
Springer
14 years 1 months ago
Timed Patterns: TCOZ to Timed Automata
Abstract. The integrated logic-based modeling language, Timed Communicating Object Z (TCOZ), is well suited for presenting complete and coherent requirement models for complex real...
Jin Song Dong, Ping Hao, Shengchao Qin, Jun Sun 00...
CBSE
2009
Springer
14 years 2 months ago
Integrating Functional and Architectural Views of Reactive Systems
An integrated model-based development approach has to capture the relationship between requirements, design, and implementation models. In the requirements engineering phase, the m...
Jewgenij Botaschanjan, Alexander Harhurin