The aim of this paper is to apply the concept of robust optimization introduced by Bel-Tal and Nemirovski to the portfolio selection problems based on multi-stage scenario trees. ...
Abstract. Network security simulator is required for the study on the cyber intrusion and defense as cyber terrors have been increasingly popular. Until now, network security simul...
We present an agent-based Producer/Consumer scenario, that is the key element of manufacturing systems and therefore of utmost importance. We call it a MSWS-system, which is made u...
We investigate the classical notion of object composition in the framework of scenario-based specification and programming. We concentrate on live sequence charts (LSC), which exte...
Yoram Atir, David Harel, Asaf Kleinbort, Shahar Ma...
The paper presents a semi-automated technique for feature location in source code. The technique is based on combining information from two different sources: an execution trace, ...