Sciweavers

3828 search results - page 722 / 766
» Proof-Based System Engineering Using a Virtual System Model
Sort
View
UML
2005
Springer
14 years 2 months ago
Evaluating the Effect of Composite States on the Understandability of UML Statechart Diagrams
UML statechart diagrams have become an important technique for describing the dynamic behavior of a software system. They are also a significant element of OO design, especially in...
José A. Cruz-Lemus, Marcela Genero, M. Espe...
SIGADA
2004
Springer
14 years 2 months ago
Comparative analysis of genetic algorithm implementations
Genetic Algorithms provide computational procedures that are modeled on natural genetic system mechanics, whereby a coded solution is “evolved” from a set of potential solutio...
Robert Soricone, Melvin Neville
ACSAC
2004
IEEE
14 years 23 days ago
Automatic Generation and Analysis of NIDS Attacks
A common way to elude a signature-based NIDS is to transform an attack instance that the NIDS recognizes into another instance that it misses. For example, to avoid matching the a...
Shai Rubin, Somesh Jha, Barton P. Miller
TEDU
2008
126views Education» more  TEDU 2008»
13 years 7 months ago
Online Learning and Clinical Procedures: Rapid Development and Effective Deployment of Game-Like Interactive Simulations
Abstract. Traditionally, medical education has used live patients to teach medical procedures. This carries a significant risk to patients. As learning technology advances, the ear...
Pablo Moreno-Ger, Carl Blesius, Paul Currier, Jos&...
TOPLAS
2010
93views more  TOPLAS 2010»
13 years 7 months ago
Semantics of fractional permissions with nesting
Fractional permissions use fractions to distinguish write access (1) from read access (any smaller fraction). Nesting (an extension of adoption) can be used to model object invari...
John Tang Boyland