• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 342,866
Next 10 →

A Viewpoint-Based Approach for Formal Safety & Security Assessment of System Architectures

by Julien Brunel, David Chemouil, Laurent Rioux, Mohamed Bakkali, Frédérique Vallée
"... Abstract. We propose an model-based approach to address safety and security assessment of a system architecture. We present an integrated process where sys-tem engineers design the model of the system architecture, safety and security engineers specify the propagation of failures and attacks inside ..."
Abstract - Add to MetaCart
Abstract. We propose an model-based approach to address safety and security assessment of a system architecture. We present an integrated process where sys-tem engineers design the model of the system architecture, safety and security engineers specify the propagation of failures and attacks inside

Nextgeneration viewpoint-based environments

by Wolfgang Emmerich, George Spanoudakis, Anthony Finkelstein - In 7th European Workshop on Next Generation of CASE Tools , 1996
"... This paper discusses the notion of, and outlines requirements for Viewpointbased Environments. These are next-generation CASE environments, which support the speci cation of requirements from multiple perspectives or so-called viewpoints. Requirements for such environments are mainly concerned with ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
with the detection and management ofinterference between viewpoints. Viewpoint-based Environments should also support the cooperation of multiple developers and maintain development histories in terms of multiple viewpoint versions. We brie y sketch an architecture for suchenvironments and outline a research agenda

Viewpoint-Based Similarity Discernment on SNAP

by Takashi Yukawa Member, Takashi Yukawa, A M. Harabagiu, Dan I. Moldovan , 1999
"... This paper presents an algorithm for viewpointbased similarity discernment of linguistic concepts on Semantic Network Array Processor (SNAP). The viewpoint-based similarity discernment plays a key role in retrieving similar propositions. This is useful for advanced knowledge processing areas such as ..."
Abstract - Add to MetaCart
This paper presents an algorithm for viewpointbased similarity discernment of linguistic concepts on Semantic Network Array Processor (SNAP). The viewpoint-based similarity discernment plays a key role in retrieving similar propositions. This is useful for advanced knowledge processing areas

Viewpoint-Based Testing of Concurrent Components

by Luke Wildman, Roger Duke, Paul Strooper
"... Abstract. The use of multiple partial viewpoints is recommended for specification. We believe they also can be useful for devising strategies for testing. In this paper, we use Object-Z to formally specify concurrent Java components from viewpoints based on the separation of application and synchron ..."
Abstract - Add to MetaCart
Abstract. The use of multiple partial viewpoints is recommended for specification. We believe they also can be useful for devising strategies for testing. In this paper, we use Object-Z to formally specify concurrent Java components from viewpoints based on the separation of application

A VARIATIONAL APPROACH FOR VIEWPOINT-BASED VISIBILITY MAXIMIZATION

by Kelvin R. Rocha, Dr. Anthony J. Yezzi, Advisor Dr, Joel R. Jackson, Dr. Allen, R. Tannenbaum, Dr. Gregory Turk , 2008
"... Dedicated to: ..."
Abstract - Add to MetaCart
Dedicated to:

R.: Viewpoint-based Meta Model Engineering

by Stephan Kurpjuweit, Robert Winter - In: Proceedings, Enterprise Modelling and Information Systems Architectures – Concepts and Applications, Proceedings of the 2nd Int'l Workshop EMISA 2007, Bonn 2007
"... Abstract: Work systems are complex artifacts that address the concerns of a large and diverse group of stakeholders. These concerns must be reflected in the models which are created as used in the development process. Current work systems engineering methods assume that concerns are more or less mut ..."
Abstract - Cited by 18 (2 self) - Add to MetaCart
mutually independent and can be addressed sequentially. We argue- in analogy to other engineering disciplines- that this assumption is too restrictive. To facilitate the creation of models that simultaneously express multiple stakeholder concerns, we propose an approach which systematically elicits

Nested Transactions: An Approach to Reliable Distributed Computing

by J. Eliot B. Moss , 1981
"... Distributed computing systems are being built and used more and more frequently. This distributod computing revolution makes the reliability of distributed systems an important concern. It is fairly well-understood how to connect hardware so that most components can continue to work when others are ..."
Abstract - Cited by 527 (1 self) - Add to MetaCart
Distributed computing systems are being built and used more and more frequently. This distributod computing revolution makes the reliability of distributed systems an important concern. It is fairly well-understood how to connect hardware so that most components can continue to work when others are broken, and thus increase the reliability of a system as a whole. This report addressos the issue of providing software for reliable distributed systems. In particular, we examine how to program a system so that the software continues to work in tho face of a variety of failures of parts of the system. The design presented

Social change and crime rate trends: a routine activity approach

by Lawrence E Cohen, Marcus Felson - American Sociological Review , 1979
"... In this paper we present a "routine activity approach " for analyzing crime rate trends and cycles. Rather than emphasizing the characteristics of offenders, with this approach we concentrate upon the circumstances in which they carry out predatory criminal acts. Most criminal acts require ..."
Abstract - Cited by 657 (5 self) - Add to MetaCart
In this paper we present a "routine activity approach " for analyzing crime rate trends and cycles. Rather than emphasizing the characteristics of offenders, with this approach we concentrate upon the circumstances in which they carry out predatory criminal acts. Most criminal acts

Smooth minimization of nonsmooth functions

by Yu. Nesterov - Math. Programming , 2005
"... In this paper we propose a new approach for constructing efficient schemes for nonsmooth convex optimization. It is based on a special smoothing technique, which can be applied to the functions with explicit max-structure. Our approach can be considered as an alternative to black-box minimization. F ..."
Abstract - Cited by 522 (1 self) - Add to MetaCart
In this paper we propose a new approach for constructing efficient schemes for nonsmooth convex optimization. It is based on a special smoothing technique, which can be applied to the functions with explicit max-structure. Our approach can be considered as an alternative to black-box minimization

A Digital Fountain Approach to Reliable Distribution of Bulk Data

by John W. Byers, Michael Luby, Michael Mitzenmacher, Ashutosh Rege - IN PROC. OF ACM SIGCOMM ’98 , 1998
"... The proliferation of applications that must reliably distribute bulk data to a large number of autonomous clients motivates the design of new multicast and broadcast prot.ocols. We describe an ideal, fully scalable protocol for these applications that we call a digital fountain. A digital fountain a ..."
Abstract - Cited by 498 (20 self) - Add to MetaCart
class of erasure codes that for large block sizes are orders of magnitude faster than standard erasure codes. We provide performance measurements that demonstrate the feasibility of our approach and discuss the design, implementation and performance of an experimental system.
Next 10 →
Results 1 - 10 of 342,866
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University