Results 1 - 10
of
342,866
A Viewpoint-Based Approach for Formal Safety & Security Assessment of System Architectures
"... Abstract. We propose an model-based approach to address safety and security assessment of a system architecture. We present an integrated process where sys-tem engineers design the model of the system architecture, safety and security engineers specify the propagation of failures and attacks inside ..."
Abstract
- Add to MetaCart
Abstract. We propose an model-based approach to address safety and security assessment of a system architecture. We present an integrated process where sys-tem engineers design the model of the system architecture, safety and security engineers specify the propagation of failures and attacks inside
Nextgeneration viewpoint-based environments
- In 7th European Workshop on Next Generation of CASE Tools
, 1996
"... This paper discusses the notion of, and outlines requirements for Viewpointbased Environments. These are next-generation CASE environments, which support the speci cation of requirements from multiple perspectives or so-called viewpoints. Requirements for such environments are mainly concerned with ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
with the detection and management ofinterference between viewpoints. Viewpoint-based Environments should also support the cooperation of multiple developers and maintain development histories in terms of multiple viewpoint versions. We brie y sketch an architecture for suchenvironments and outline a research agenda
Viewpoint-Based Similarity Discernment on SNAP
, 1999
"... This paper presents an algorithm for viewpointbased similarity discernment of linguistic concepts on Semantic Network Array Processor (SNAP). The viewpoint-based similarity discernment plays a key role in retrieving similar propositions. This is useful for advanced knowledge processing areas such as ..."
Abstract
- Add to MetaCart
This paper presents an algorithm for viewpointbased similarity discernment of linguistic concepts on Semantic Network Array Processor (SNAP). The viewpoint-based similarity discernment plays a key role in retrieving similar propositions. This is useful for advanced knowledge processing areas
Viewpoint-Based Testing of Concurrent Components
"... Abstract. The use of multiple partial viewpoints is recommended for specification. We believe they also can be useful for devising strategies for testing. In this paper, we use Object-Z to formally specify concurrent Java components from viewpoints based on the separation of application and synchron ..."
Abstract
- Add to MetaCart
Abstract. The use of multiple partial viewpoints is recommended for specification. We believe they also can be useful for devising strategies for testing. In this paper, we use Object-Z to formally specify concurrent Java components from viewpoints based on the separation of application
R.: Viewpoint-based Meta Model Engineering
- In: Proceedings, Enterprise Modelling and Information Systems Architectures – Concepts and Applications, Proceedings of the 2nd Int'l Workshop EMISA 2007, Bonn 2007
"... Abstract: Work systems are complex artifacts that address the concerns of a large and diverse group of stakeholders. These concerns must be reflected in the models which are created as used in the development process. Current work systems engineering methods assume that concerns are more or less mut ..."
Abstract
-
Cited by 18 (2 self)
- Add to MetaCart
mutually independent and can be addressed sequentially. We argue- in analogy to other engineering disciplines- that this assumption is too restrictive. To facilitate the creation of models that simultaneously express multiple stakeholder concerns, we propose an approach which systematically elicits
Nested Transactions: An Approach to Reliable Distributed Computing
, 1981
"... Distributed computing systems are being built and used more and more frequently. This distributod computing revolution makes the reliability of distributed systems an important concern. It is fairly well-understood how to connect hardware so that most components can continue to work when others are ..."
Abstract
-
Cited by 527 (1 self)
- Add to MetaCart
Distributed computing systems are being built and used more and more frequently. This distributod computing revolution makes the reliability of distributed systems an important concern. It is fairly well-understood how to connect hardware so that most components can continue to work when others are broken, and thus increase the reliability of a system as a whole. This report addressos the issue of providing software for reliable distributed systems. In particular, we examine how to program a system so that the software continues to work in tho face of a variety of failures of parts of the system. The design presented
Social change and crime rate trends: a routine activity approach
- American Sociological Review
, 1979
"... In this paper we present a "routine activity approach " for analyzing crime rate trends and cycles. Rather than emphasizing the characteristics of offenders, with this approach we concentrate upon the circumstances in which they carry out predatory criminal acts. Most criminal acts require ..."
Abstract
-
Cited by 657 (5 self)
- Add to MetaCart
In this paper we present a "routine activity approach " for analyzing crime rate trends and cycles. Rather than emphasizing the characteristics of offenders, with this approach we concentrate upon the circumstances in which they carry out predatory criminal acts. Most criminal acts
Smooth minimization of nonsmooth functions
- Math. Programming
, 2005
"... In this paper we propose a new approach for constructing efficient schemes for nonsmooth convex optimization. It is based on a special smoothing technique, which can be applied to the functions with explicit max-structure. Our approach can be considered as an alternative to black-box minimization. F ..."
Abstract
-
Cited by 522 (1 self)
- Add to MetaCart
In this paper we propose a new approach for constructing efficient schemes for nonsmooth convex optimization. It is based on a special smoothing technique, which can be applied to the functions with explicit max-structure. Our approach can be considered as an alternative to black-box minimization
A Digital Fountain Approach to Reliable Distribution of Bulk Data
- IN PROC. OF ACM SIGCOMM ’98
, 1998
"... The proliferation of applications that must reliably distribute bulk data to a large number of autonomous clients motivates the design of new multicast and broadcast prot.ocols. We describe an ideal, fully scalable protocol for these applications that we call a digital fountain. A digital fountain a ..."
Abstract
-
Cited by 498 (20 self)
- Add to MetaCart
class of erasure codes that for large block sizes are orders of magnitude faster than standard erasure codes. We provide performance measurements that demonstrate the feasibility of our approach and discuss the design, implementation and performance of an experimental system.
Results 1 - 10
of
342,866