Sciweavers

8623 search results - page 1663 / 1725
» Software engineering for secure systems
Sort
View
GECCO
2010
Springer
141views Optimization» more  GECCO 2010»
14 years 11 days ago
Today/future importance analysis
SBSE techniques have been widely applied to requirements selection and prioritization problems in order to ascertain a suitable set of requirements for the next release of a syste...
Yuanyuan Zhang, Enrique Alba, Juan J. Durillo, Sig...
WSC
2007
13 years 11 months ago
The simulation power of automod
Decision making in industry continues to become more complicated. Customers are more demanding, competition is more fierce, and costs for labor and raw materials continue to rise....
Todd LeBaron, Craig Jacobsen
ATAL
2008
Springer
13 years 11 months ago
Constitutive interoperability
nts have recently emerged as a valuable abstraction for characterizing interactions among autonomous agents at the level of their business relationships. Traditionally, interopera...
Amit K. Chopra, Munindar P. Singh
CAISE
2008
Springer
13 years 11 months ago
Refactoring Process Models in Large Process Repositories
With the increasing adoption of process-aware information systems (PAIS), large process model repositories have emerged. Over time respective models have to be re-aligned to the re...
Barbara Weber, Manfred Reichert
EGOV
2008
Springer
13 years 10 months ago
Test Strategies for Evaluation of Semantic eGovernment Applications
In this paper we present a framework for identifying the test focus and test objectives based on the assumption that automatic information processing based on encoded meaning is th...
Ralf Klischewski, Stefan Ukena
« Prev « First page 1663 / 1725 Last » Next »