Sciweavers

1522 search results - page 240 / 305
» Requirements analysis for large scale systems
Sort
View
EXPERT
1998
86views more  EXPERT 1998»
13 years 7 months ago
IMACS: A Case Study in Real-World Planning
This article illustrates the complexities of real-world planning and how we can create AI planning systems to address them. We describe the IMACS Project (Interactive Manufacturab...
Satyandra K. Gupta, Dana S. Nau, William C. Regli
CODES
2008
IEEE
13 years 9 months ago
Profiling of lossless-compression algorithms for a novel biomedical-implant architecture
In view of a booming market for microelectronic implants, our ongoing research work is focusing on the specification and design of a novel biomedical microprocessor core targeting...
Christos Strydis, Georgi Gaydadjiev
CEC
2009
IEEE
14 years 2 months ago
Coevolution of simulator proxies and sampling strategies for petroleum reservoir modeling
— Reservoir modeling is an on-going activity during the production life of a reservoir. One challenge to constructing accurate reservoir models is the time required to carry out ...
Tina Yu, Dave Wilkinson
SP
2008
IEEE
138views Security Privacy» more  SP 2008»
14 years 2 months ago
Practical Proactive Integrity Preservation: A Basis for Malware Defense
Unlike today’s reactive approaches, information flow based approaches can provide positive assurances about overall system integrity, and hence can defend against sophisticated...
Weiqing Sun, R. Sekar, Gaurav Poothia, Tejas Karan...
EATIS
2007
ACM
13 years 11 months ago
Analysing and enhancing business processes and IT-systems for mobile workforce automation: a framework approach
Mobile B2E-applications (business-to-employee) can add significant value to a company's business, when large workforce divisions are involved in the execution of certain busi...
Volker Gruhn, André Köhler