نتایج جستجو برای: case modeling

تعداد نتایج: 1709370  

Journal: :Expert Syst. Appl. 2013
Dusan Teodorovic Milica Selmic Ljiljana Mijatovic-Teodorovic

Thyroid cancers are the most common endocrine carcinomas. Case-based reasoning (CBR) is used in this paper to describe a physician’s expertise, intuition and experience when treating patients with well differentiated thyroid cancer. Various clinical parameters (the patient’s diagnosis, the patient’s age, the tumor size, the existence of metastases in the lymph nodes and the existence of distant...

2000
Ekkart Rudolph Ina Schieferdecker Jens Grabowski

The development of an Message Sequence Chart (MSC) based graphical representation of the Tree and Tabular Combined Notation (TTCN) is part of the ETSI project STF 156 on 'Specification of a Message Sequence Chart/UML format, including validation for TTCN-3'. Experiments with different kinds of MSC representations show that certain extensions of the MSC language are requested in order to obtain ...

2006
Barbara Weber Manfred Reichert Werner Wild

The success of a company more and more depends on its ability to flexibly and quickly react to changes. Combining process management techniques and conversational case-based reasoning (CCBR) allows for flexibly aligning the business processes to new requirements by providing integrated process life cycle support. This includes the adaptation of business processes to changing needs by allowing d...

2010
Marta Z. Kwiatkowska Gethin Norman David Parker

Quantitative verification techniques are able to establish system properties such as “the probability of an airbag failing to deploy on demand” or “the expected time for a network protocol to successfully send a message packet”. In this paper, we describe a framework for quantitative verification of software that exhibits both real-time and probabilistic behaviour. The complexity of real softwa...

2015
Kristof Böhmer Stefanie Rinderle-Ma

Process models tend to become more and more complex and, therefore, also more and more test cases are required to assure their correctness and stability during design and maintenance. However, executing hundreds or even thousands of process model test cases leads to excessive test suite execution times and, therefore, high costs. Hence, this paper presents a novel approach for process model tes...

2003
Paulo Gomes Francisco C. Pereira Paulo Paiva Nuno Seco Paulo Carreiro José Luís Ferreira Carlos Bento

Software reuse has the potential of reducing development time and increasing software quality. There are several types of knowledge that can be reused, with code being the most common reused one. Code reuse is the most direct and easier type of reuse, but is not the most efficient one. Design reuse is more productive than code reuse, because changes at the design level can have big effects on t...

Block-flexure is the most common mode of toppling failure in natural and excavated rock slopes. In such failure, some rock blocks break due to tensile stresses and some overturn under their own weights and then all of them topple together. In this paper, first, a brief review of previous studies on toppling failures is presented. Then, the physical and mechanical properties of experimental mode...

A. K. Dixit, B. C. Panda, M. K. Roul,

The objective of this work is to predict the temperature of the different types of walls which are Ferro cement wall, reinforced cement concrete (RCC) wall and two types of cavity walls (combined RCC with Ferrocement and combined two Ferro cement walls) with the help of mathematical modeling. The property of low thermal transmission of small air gap between the constituents of combine materials...

Air Pollution is one of the significant problems in Tehran. Understanding the role of different sources can result in better decision-making. Some pollutions are not emitted directly from sources and are present in the atmosphere due to chemical reactions. Therefore, using air quality modeling can be beneficial to our understanding of these phenomena. An air quality modeling system was used fir...

2010
Raimundas Matulevicius Marlon Dumas

Nowadays security has become an important aspect in information systems engineering. A mainstream method for information system security is Role-based Access Control (RBAC), which restricts system access to authorised users. Recently different authors have proposed a number of modelling languages (e.g., abuse cases, misuse cases, secure i*, secure Tropos, and KAOS extensions to security) that f...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید