نتایج جستجو برای: many software including grads

تعداد نتایج: 2093129  

2009
Iván García-Magariño Jorge J. Gómez-Sanz Rubén Fuentes-Fernández

Practitioners of model-driven engineering usually find that producing model transformations still requires much effort. The Model Transformation By-Example (MTBE) approach softens this problem by means of the automated creation of model transformations from pairs of source and target model examples. However, the current techniques and tools for MTBE are limited in the sense that they can only p...

2014
Hajer Saada Marianne Huchard Michel Liquiere Clémentine Nebut

In Model Driven Engineering (MDE), a Model Transformation is a specialized program, often composed of a set of rules to transform models. The Model Transformation By Example (MTBE) approach aims to assist the developer by learning model transformations from source and target model examples.In a previous work, we proposed an approach which takes as input a fragmented source model and a target mo...

2002
Alexander Felfernig Gerhard Friedrich Dietmar Jannach Markus Zanker

Product configuration is a key technology in today’s highly specialized economy. Within the scope of state-of-the-art B2B frameworks and eProcurement solutions, various initiatives take into account the provision of configuration services. However, they all are based on the idea of defining quasistandards for many-to-many relationships between customers and vendors. When moving towards networke...

2008
Reto Kohlas Jacek Jonczy Rolf Haenni

We introduce a trust evaluation method applicable in a decentralized setting, in which no universally trusted authority exists. The method makes simultaneous use of logic and probability theory. The result of the qualitative part of the method are logical arguments for and against the reliability of an entity. The quantitative part returns the probability that the reliability of an entity can b...

2006
Nenad Stefanovic Vidosav Majstorovic Dusan Stefanovic

This paper discusses the need for Supply Chain Business Intelligence and driving forces for its adoption, and presents BI development life cycle along with quality success factors. Also, Internet-based supply chain BI model that enables many-to-many, loosely-coupled information exchange for collaborative business analysis and decision making is described. Finally, the main elements of the devel...

Journal: :IACR transactions on cryptographic hardware and embedded systems 2021

We explore the concrete side-channel security provided by state-of-theart higher-order masked software implementations of AES and (candidate to NIST Lightweight Cryptography competition) Clyde, in ARM Cortex-M0 M3 devices. Rather than looking for possibly reduced orders (as frequently considered literature), we directly target these assuming their maximum order aim at reducing noise level thank...

Journal: :IEEE Computer 1999
James Bullock

My impression is that successful projects belong to the same people, the kind of people who recognize problems and deploy countermeasures more effectively than others. In order to be successful at what they develop, these people apply far more than a single model not only to detect problems and identify countermeasures, but to plan. One of these models—a model that we all employ, consciously or...

Journal: :CoRR 2017
Asit Chakraborti Syed Obaid Amin Aytac Azgin Ravishankar Ravindran Guoqiang Wang

This paper proposes a scalable and resilient real-time multi-party communication architecture for the delivery of mixed media streams, for which content centric networking, with its intelligent network layer, is chosen for implementation to address the shortcomings of the current IP-based Internet architecture. Content centric networking (CCN) represents one of the major proposals targeting fut...

2008
Nalin Saigal Jay Ligatti

Code modularization provides benefits throughout the software life cycle; however, the presence of crosscutting concerns (CCCs) in software hinders its complete modularization. In this paper, we describe IVCon, a GUI-based tool that provides a novel approach to modularization of CCCs. IVCon enables users to create, examine, and modify their code in two different views, the woven view and the un...

1999
Mario Baldi Yoram Ofek

In general topology networks, routing from one node to another over a tree embedded in the network is intuitively a good strategy, since it typically results in a route length of O(log n) links, being n the number of nodes in the network. Routing from one node to another over a ring embedded in the network would result in route length of O(n) links. However, in group (many-to-many) multicast, t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید