Sciweavers

3381 search results - page 45 / 677
» Using VCL as an Aspect-Oriented Approach to Requirements Mod...
Sort
View
136
Voted
ZEUS
2010
180views Communications» more  ZEUS 2010»
15 years 6 months ago
An efficient approach to detect lack of synchronization in acyclic workflow graphs
Control-flow analysis of business process models requires to check the absence of lack of synchronization. We use workflow graphs, which may contain inclusive OR gateways, to repre...
Cédric Favre
WWW
2005
ACM
16 years 5 months ago
Ensuring required failure atomicity of composite Web services
The recent evolution of Internet, driven by the Web services technology, is extending the role of the Web from a support of information interaction to a middleware for B2B interac...
Sami Bhiri, Olivier Perrin, Claude Godart
INFOCOM
2003
IEEE
15 years 10 months ago
Internet Quarantine: Requirements for Containing Self-Propagating Code
— It has been clear since 1988 that self-propagating code can quickly spread across a network by exploiting homogeneous security vulnerabilities. However, the last few years have...
David Moore, Colleen Shannon, Geoffrey M. Voelker,...
IJCSS
2006
116views more  IJCSS 2006»
15 years 4 months ago
Extracting Motor Unit Firing Information by Independent Component Analysis of Surface Electromyogram: A Preliminary Study Using
Decomposition of electromyogram (EMG) provides a valuable means of obtaining motor unit recruitment and firing rate information. The feasibility of decomposing surface EMG signals...
Ping Zhou, M. M. Lowery, W. Zev Rymer
135
Voted
RE
2009
Springer
15 years 9 months ago
A Use Case Based Approach to Feature Models' Construction
In the research of software reuse, feature models have been widely adopted to organize the requirements of a set of applications in a software domain. However, there still lacks a...
Bo Wang, Wei Zhang, Haiyan Zhao, Zhi Jin, Hong Mei