Sciweavers

5843 search results - page 1054 / 1169
» Software Security in Practice
Sort
View
FORTE
1994
13 years 11 months ago
Proving the value of formal methods
The record of successful applications of formal verification techniques is slowly growing. Our ultimate aim, however, is not to perform small pilot projects that show that verific...
Gerard J. Holzmann
IJCAI
1989
13 years 11 months ago
A Technique for Customizing Object-Oriented Knowledge Representation Systems, With An Application to Network Problem Management
Over the last few years, object-oriented techniques have gained an increasing recognition both in software engineering and in AI. Object-oriented systems present undisputable adva...
Lisiane Goffaux, Robert Mathonet
SPLC
2007
13 years 11 months ago
A Quality Model for Evaluating Feature Models
This paper presents work in progress to construct a model for guiding and evaluating the quality of featureoriented models, called FMQ. Product line concepts are becoming increasi...
Christer Thörn
APCCM
2009
13 years 11 months ago
Modelling Web-Oriented Architectures
Service-oriented architectures (SOAs) provide the basis of distributed application frameworks where software components are provided as modular and reusable services. Until today ...
Gunnar Thies, Gottfried Vossen
GECCO
2008
Springer
147views Optimization» more  GECCO 2008»
13 years 11 months ago
On selecting the best individual in noisy environments
In evolutionary algorithms, the typical post-processing phase involves selection of the best-of-run individual, which becomes the final outcome of the evolutionary run. Trivial f...
Wojciech Jaskowski, Wojciech Kotlowski
« Prev « First page 1054 / 1169 Last » Next »