Sciweavers

8623 search results - page 1669 / 1725
» Software engineering for secure systems
Sort
View
ENTCS
2010
103views more  ENTCS 2010»
13 years 6 months ago
Model Testing Asynchronously Communicating Objects using Modulo AC Rewriting
Testing and verification of asynchronously communicating objects in open environments are challenging due to non-determinism. We explore a formal approach for black-box testing by...
Olaf Owe, Martin Steffen, Arild B. Torjusen
ESWA
2010
105views more  ESWA 2010»
13 years 6 months ago
A numerical comparison between simulated annealing and evolutionary approaches to the cell formation problem
The Cell Formation Problem is a crucial component of a cell production design in a manufacturing system. This problem consists of a set of product parts to be manufactured in a gr...
Andres Pailla, Athila R. Trindade, Victor Parada, ...
JSAC
2011
108views more  JSAC 2011»
13 years 4 months ago
A Model-Based Approach to Cognitive Radio Design
Abstract—Cognitive radio is a promising technology for fulfilling the spectrum and service requirements of future wireless communication systems. Real experimentation is a key f...
Jorg Lotze, Suhaib A. Fahmy, Juanjo Noguera, Linda...
WWW
2011
ACM
13 years 4 months ago
Evaluation of valuable user generated content on social news web sites
Social news websites have gained significant popularity over the last few years. The participants of such websites are not only allowed to share news links but also to annotate, ...
Yana Volkovich, Andreas Kaltenbrunner
EJC
2010
13 years 3 months ago
Inferencing in Database Semantics
As a computational model of natural language communication, Database Semantics1 (DBS) includes a hearer mode and a speaker mode. For the content to be mapped into language expressi...
Roland Hausser
« Prev « First page 1669 / 1725 Last » Next »