Sciweavers

4923 search results - page 748 / 985
» Software Risk Management
Sort
View
GECCO
2005
Springer
135views Optimization» more  GECCO 2005»
14 years 3 months ago
Parameter sweeps for exploring GP parameters
This paper describes our procedure and a software application for conducting large parameter sweep experiments in genetic and evolutionary computation research. Both procedure and...
Michael E. Samples, Jason M. Daida, Matthew J. Byo...
ICESS
2005
Springer
14 years 3 months ago
Support Industrial Hard Real-Time Traffic with Switched Ethernet
: This paper presents a simple and efficient switched Ethernet communication protocol for industrial hard real-time LAN applications. The network is founded with end nodes and a sw...
Alimujiang Yiming, Toshio Eisaka
ITRUST
2005
Springer
14 years 3 months ago
A Probabilistic Trust Model for Handling Inaccurate Reputation Sources
Abstract. This research aims to develop a model of trust and reputation that will ensure good interactions amongst software agents in large scale open systems in particular. The fo...
Jigar Patel, W. T. Luke Teacy, Nicholas R. Jenning...
RE
2005
Springer
14 years 3 months ago
Multi-Dimensional Separation of Concerns in Requirements Engineering
Existing requirements engineering approaches manage broadly scoped requirements and constraints in a fashion that is largely two-dimensional, where functional requirements serve a...
Ana Moreira, Awais Rashid, João Araú...
RE
2005
Springer
14 years 3 months ago
Using Occurrence Properties of Defect Report Data to Improve Requirements
Defect reports generated for faults found during testing provide a rich source of information regarding problematic phrases used in requirements documents. These reports indicate ...
Kimberly S. Wasson, Kendra N. Schmid, Robyn R. Lut...