Sciweavers

1746 search results - page 188 / 350
» Residual for Component Specifications
Sort
View
141
Voted
JCP
2008
116views more  JCP 2008»
15 years 4 months ago
Formal Verification and Visualization of Security Policies
Verified and validated security policies are essential components of high assurance computer systems. The design and implementation of security policies are fundamental processes i...
Luay A. Wahsheh, Daniel Conte de Leon, Jim Alves-F...
JUCS
2008
166views more  JUCS 2008»
15 years 4 months ago
Learning Design in Adaptive Educational Hypermedia Systems
: After more than ten years of research aiming at defining methods and techniques to deliver personalized instruction, Adaptive Educational Hypermedia Systems have not made the jum...
Adriana J. Berlanga, Francisco José Garc&ia...
150
Voted
TSC
2008
91views more  TSC 2008»
15 years 4 months ago
Selective Querying for Adapting Web Service Compositions Using the Value of Changed Information
Web service composition (WSC) techniques assume that the parameters used to model the environment remain static and accurate throughout the composition's execution. However, W...
John Harney, Prashant Doshi
ENVSOFT
2002
129views more  ENVSOFT 2002»
15 years 4 months ago
Linking GIS and water resources management models: an object-oriented method
Many challenges are associated with the integration of geographic information systems (GISs) with models in specific applications. One of them is adapting models to the environmen...
Daene C. McKinney, Ximing Cai
JIRS
2000
118views more  JIRS 2000»
15 years 4 months ago
A Flexible Microrobot-Based Microassembly Station
Abstract. A wide range of microcomponents can today be produced using various microfabrication techniques. The assembly of complex microsystems consisting of several single compone...
Sergej Fatikow, Jörg Seyfried, Stephan Fahlbu...