Sciweavers

357 search results - page 56 / 72
» On the Model of Computation of Place Transition Petri Nets
Sort
View
JIT
2005
Springer
134views Database» more  JIT 2005»
14 years 1 months ago
MAGI - Mobile Access to Grid Infrastructure: Bringing the gifts of Grid to Mobile Computing
: Access to Grid services is currently limited to devices having significant computing, network resources etc. such as desktop computers. On the other hand, most of mobile devices ...
Ali Sajjad, Hassan Jameel, Umar Kalim, Young-Koo L...
IPPS
2002
IEEE
14 years 14 days ago
Failure Behavior Analysis for Reliable Distributed Embedded Systems
Failure behavior analysis is a very important phase in developing large distributed embedded systems with weak safety requirements which do graceful degradation in case of failure...
Mario Trapp, Bernd Schürmann, Torsten Tettero...
ICECCS
2009
IEEE
140views Hardware» more  ICECCS 2009»
14 years 2 months ago
Common Pitfalls of Using QVT Relations - Graphical Debugging as Remedy
OMG’s Model-Driven Architecture (MDA) has emerged as a new approach for the development of software. For this, the Query/View/Transformation (QVT) standard plays a central role,...
Angelika Kusel, Wieland Schwinger, Manuel Wimmer, ...
ECBS
2006
IEEE
143views Hardware» more  ECBS 2006»
14 years 1 months ago
Requirements Engineering for the Adviser Portal Bank System
The Adviser Portal (AP) is a new IT system for 15 Danish banks. The main goal of AP is to increase the efficiency and quality of bank advisers’ work. Requirements engineering fo...
Jens Bæk Jørgensen, Kristian Bisgaard...
SPIN
2009
Springer
14 years 2 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...