Sciweavers

12551 search results - page 2268 / 2511
» Reuse in Systems Engineering
Sort
View
HICSS
2007
IEEE
141views Biometrics» more  HICSS 2007»
15 years 11 months ago
Second-Best Combinatorial Auctions - The Case of the Pricing-Per-Column Mechanism
One of the main contributions of classical mechanism design is the derivation of the Groves mechanisms. The class of Groves mechanisms are the only mechanisms that are strategy-pr...
Dirk Neumann, Björn Schnizler, Ilka Weber, Ch...
HICSS
2007
IEEE
94views Biometrics» more  HICSS 2007»
15 years 11 months ago
Towards Model Transformation Generation By-Example
— With the advent of Model-Driven Engineering (MDE) several model transformation approaches and languages have been developed in the last 5 years. Most of these existing approach...
Manuel Wimmer, Michael Strommer, Horst Kargl, Gerh...
ICC
2007
IEEE
103views Communications» more  ICC 2007»
15 years 11 months ago
An Experimental Design Approach for Optimizing SMSE Waveforms to Minimize Coexistent Interference
Abstract— An experimental design approach is used to determine which factors (design parameters) of Spectrally Modulated, Spectrally Encoded (SMSE) waveforms have the greatest im...
Todd W. Beard, Michael A. Temple, Marcus L. Robert...
ICDCS
2007
IEEE
15 years 11 months ago
Testing Security Properties of Protocol Implementations - a Machine Learning Based Approach
Security and reliability of network protocol implementations are essential for communication services. Most of the approaches for verifying security and reliability, such as forma...
Guoqiang Shu, David Lee
ICEBE
2007
IEEE
151views Business» more  ICEBE 2007»
15 years 11 months ago
Systematic Security Analysis for Service-Oriented Software Architectures
Due to the dramatic increase in intrusive activities architecture security analysis and design has emerged as an important aspect of the development of software services. It is a ...
Yanguo Liu, Issa Traoré
« Prev « First page 2268 / 2511 Last » Next »