نتایج جستجو برای: many software including grads
تعداد نتایج: 2093129 فیلتر نتایج به سال:
Practitioners of model-driven engineering usually find that producing model transformations still requires much effort. The Model Transformation By-Example (MTBE) approach softens this problem by means of the automated creation of model transformations from pairs of source and target model examples. However, the current techniques and tools for MTBE are limited in the sense that they can only p...
In Model Driven Engineering (MDE), a Model Transformation is a specialized program, often composed of a set of rules to transform models. The Model Transformation By Example (MTBE) approach aims to assist the developer by learning model transformations from source and target model examples.In a previous work, we proposed an approach which takes as input a fragmented source model and a target mo...
Product configuration is a key technology in today’s highly specialized economy. Within the scope of state-of-the-art B2B frameworks and eProcurement solutions, various initiatives take into account the provision of configuration services. However, they all are based on the idea of defining quasistandards for many-to-many relationships between customers and vendors. When moving towards networke...
We introduce a trust evaluation method applicable in a decentralized setting, in which no universally trusted authority exists. The method makes simultaneous use of logic and probability theory. The result of the qualitative part of the method are logical arguments for and against the reliability of an entity. The quantitative part returns the probability that the reliability of an entity can b...
This paper discusses the need for Supply Chain Business Intelligence and driving forces for its adoption, and presents BI development life cycle along with quality success factors. Also, Internet-based supply chain BI model that enables many-to-many, loosely-coupled information exchange for collaborative business analysis and decision making is described. Finally, the main elements of the devel...
We explore the concrete side-channel security provided by state-of-theart higher-order masked software implementations of AES and (candidate to NIST Lightweight Cryptography competition) Clyde, in ARM Cortex-M0 M3 devices. Rather than looking for possibly reduced orders (as frequently considered literature), we directly target these assuming their maximum order aim at reducing noise level thank...
My impression is that successful projects belong to the same people, the kind of people who recognize problems and deploy countermeasures more effectively than others. In order to be successful at what they develop, these people apply far more than a single model not only to detect problems and identify countermeasures, but to plan. One of these models—a model that we all employ, consciously or...
This paper proposes a scalable and resilient real-time multi-party communication architecture for the delivery of mixed media streams, for which content centric networking, with its intelligent network layer, is chosen for implementation to address the shortcomings of the current IP-based Internet architecture. Content centric networking (CCN) represents one of the major proposals targeting fut...
Code modularization provides benefits throughout the software life cycle; however, the presence of crosscutting concerns (CCCs) in software hinders its complete modularization. In this paper, we describe IVCon, a GUI-based tool that provides a novel approach to modularization of CCCs. IVCon enables users to create, examine, and modify their code in two different views, the woven view and the un...
In general topology networks, routing from one node to another over a tree embedded in the network is intuitively a good strategy, since it typically results in a route length of O(log n) links, being n the number of nodes in the network. Routing from one node to another over a ring embedded in the network would result in route length of O(n) links. However, in group (many-to-many) multicast, t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید