Sciweavers

813 search results - page 15 / 163
» Pipeline-centric provenance model
Sort
View
ICSE
2003
IEEE-ACM
14 years 7 months ago
Usage-Centered Design and Software Engineering: Models for Integration
This paper argues for a model-driven framework for integrating human interface engineering with software engineering. The usage-centered design process, a robust and proven proces...
Larry L. Constantine, Robert Biddle, James Noble
GI
2009
Springer
13 years 5 months ago
Constraint-Based Task Scheduling with Sequence Dependent Setup Times, Time Windows and Breaks
Abstract: The work presented in this article generalizes the modeling of task scheduling problems with sequence dependent setup time on the basis of task scheduling on single respe...
Armin Wolf
CP
2005
Springer
14 years 1 months ago
Robust Constraint Solving Using Multiple Heuristics
Abstract. Constraint Programming is a proven successful technique, but it requires skill in modeling problems, and knowledge on how algorithms interact with models. What can be a g...
Alfio Vidotto, Kenneth N. Brown, J. Christopher Be...
ASPDAC
2009
ACM
249views Hardware» more  ASPDAC 2009»
14 years 10 days ago
Automatic generation of Cycle Accurate and Cycle Count Accurate transaction level bus models from a formal model
— This paper proposes the first automatic approach to simultaneously generate Cycle Accurate and Cycle Count Accurate transaction level bus models. Since TLM (Transaction Level M...
Chen Kang Lo, Ren-Song Tsay
CCS
2006
ACM
13 years 11 months ago
Multi-signatures in the plain public-Key model and a general forking lemma
A multi-signature scheme enables a group of signers to produce a compact, joint signature on a common document, and has many potential uses. However, existing schemes impose key s...
Mihir Bellare, Gregory Neven