نتایج جستجو برای: and methodology

تعداد نتایج: 16844190  

Journal: :Theor. Comput. Sci. 2004
Olga Grinchtein Bengt Jonsson Martin Leucker

In regular inference, a regular language is inferred from answers to a finite set of membership queries, each of which asks whether the language contains a certain word. One of the most well-known regular inference algorithms is the L∗ algorithm due to Dana Angluin. However, there are almost no extensions of these algorithms to the setting of timed systems. We extend Angluin’s algorithm for on-...

1997
Sharon M. Bitzer Magdi N. Kamel

The Workflow Reengineering Methodology (WRM) is a proposed methodology that uses workflow management automation to enable Business Process Reengineering (BPR). Unlike published BPR methodologies that use historical and estimated process data gathered from workflow participants, WRM uses the more accurate, real-time process measurements, gathered by the workflow tool, to improve the efficiency, ...

2017
L Trenary T DelSole M K Tippett K Pegion

We propose a general methodology for determining the lagged ensemble that minimizes the mean square forecast error. The MSE of a lagged ensemble is shown to depend only on a quantity called the cross-lead error covariance matrix, which can be estimated from a short hindcast data set and parameterized in terms of analytic functions of time. The resulting parameterization allows the skill of fore...

Journal: :IJNVO 2003
Martin Tølle Peter Bernus

This article analyses different types of reference models applicable to support the set up and (re)configuration of Virtual Enterprises (VEs). Reference models are models capturing concepts common to VEs aiming to convert the task of setting up a VE into a configuration task, and hence reducing the time needed for VE creation. The reference models are analysed through a mapping onto the Virtual...

2011
Jonathan Bromley

For us, UVM arrived at exactly the right time. Our large new project evidently called for more powerful verification techniques than its predecessors. At the same time, a change of tool chain was on the horizon, bringing cross-vendor compatibility concerns to the fore. Finally, many members of the team were beginning to take their first steps in OOP and constrained-random verification, making i...

2008
William J. Welch

This article presents a branch-and-bound algorithm that constructs a catalog of all D-optimal n-point designs for specified design region, linear model, and number of observations, n. While the primary design criterion is D optimality, the algorithm may also be used to find designs performing well by other secondary criteria, if a small sacrifice in efficiency as measured by D optimality is acc...

2017
Lin Zhu Ligang Hou Qiuyun Xu Jingsong Zhi Jinhui Wang

ABSTRACT:This paper applied UVM (Universal Verification Methodology), an advanced verification methodology which was based on SystemVerilog language to build AES (Advanced Encryption Standard) IP verification platform and environment. Functional verification of the AES module, through a large number of testcases and constrained random test could achieve 100% functional coverage. In addition, th...

2006
Florian Urmetzer Mark Baker Vassil Alexandrov

e-Research is a relatively new and expanding means of undertaking multi-disciplinary on-line research. As such, the needs and requirements of the e-Research community are not yet fully understood and it is evident that it needs further investigation and study. This paper aims to provide basic guidance on the research methods that will be useful in order to gather information from the users of m...

2012
ALBERTO LANZAVECCHIA Alberto Lanzavecchia

This study extends research on the social performance of microfinance institutions. The research methodology is based on Grameen Progress out of Poverty Index™ (PPI™) for Cambodia applied to a sample of borrowers randomly extracted from a Cambodian microfinance institution's loan portfolio. Dataset has been directly collected through in-house interviews. Main questions discussed here are: (1) I...

2007
Mamadou H. Diallo Leila Naslavsky Thomas A. Alspaugh Hadar Ziv Debra J. Richardson

We describe an approach for evaluating whether a candidate architecture dependably satisfies stakeholder requirements expressed in requirements-level scenarios. We map scenarios to architectural elements through an ontology of requirements-level event classes and domain entities. The scenarios express both functional requirements and quality attributes of the system; for quality attributes, the...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید