A systems re-engineering technique to integrated control and supervision for applications to industrial multi-zone furnaces has been elaborated by using known theories on generalized predictive control and nonlinear p...
详细信息
UML is a good tool to represent ontologies. When using UML for ontology development, one of the principal goals is to assure the quality of ontologies. UML class diagrams provide a static modeling capability that is w...
详细信息
ISBN:
(纸本)0769521185
UML is a good tool to represent ontologies. When using UML for ontology development, one of the principal goals is to assure the quality of ontologies. UML class diagrams provide a static modeling capability that is well suited for representing ontologies, so the structural complexity of a UML class diagram is one of the most important measures to evaluate the quality of the ontologies. This paper uses weighted class dependence graphs to represent given class diagrams, and then presents a structure complexity measure for the UML class diagrams based on entropy distance. It considers complexity of both classes and relationships between the classes, and presents rules for transforming complexity value of classes and different kinds of relations into weighted class dependence graphs. This method can measure the structure complexity of class diagrams objectively.
THEMIS (Threat Evaluation Metamodel for information Systems) is a description logic-based framework to apply state, federal, and international law to reason about the intent of computer network attacks with respect to...
详细信息
Peculiarity rules are a new type of interesting rules which can be discovered by searching the relevance among peculiar data. A main task of mining peculiarity rules is the identification of peculiarity. Traditional m...
详细信息
software reuse should be engineered as early as possible in the software development life cycle. The earlier reusability considerations are put into software development, the larger the payoff can be obtained from reu...
详细信息
software reuse should be engineered as early as possible in the software development life cycle. The earlier reusability considerations are put into software development, the larger the payoff can be obtained from reuse. Today, many organizations recognize that an architecture represent a significant investment of both time and effort of its design expertise. The organizations want to maximize this investment by reusing architecture on multiple systems. There are two settings in which architectures can be reused: within an organization and across organizations. This paper describes our work in creating and evolving product-line architecture for a family of software systems within an organization. The approach is illustrated with an industrial example of a commercial tool for reverse engineering. This paper also presents the problems with the solutions in reusing architecture in an industrial setting.
SWENET, the network community for softwareengineering education, is an NSF funded project to develop curriculum modules of value to faculty members desiring to incorporate softwareengineering concepts in new or exis...
详细信息
SWENET, the network community for softwareengineering education, is an NSF funded project to develop curriculum modules of value to faculty members desiring to incorporate softwareengineering concepts in new or existing courses. By design, the modules are self-contained instructional units ranging from a single lecture to approximately one week of course material. In this way, instructors can adopt, adapt, and arrange modules as appropriate to their courses. This presentation will provide an update on the status of the project including a report of current progress and problems encountered. The session will also address the future of the course materials collection and solicit input on ways to provide ongoing support to the community of softwareengineering researchers.
Peculiarity rules are a new type of interesting rules which can be discovered by searching the relevance among peculiar data. A main task of mining peculiarity rules is the identification of peculiarity. Traditional m...
详细信息
Peculiarity rules are a new type of interesting rules which can be discovered by searching the relevance among peculiar data. A main task of mining peculiarity rules is the identification of peculiarity. Traditional methods of finding peculiar data are attribute-based approaches. This paper extends peculiarity oriented mining to relational peculiarity oriented mining. Peculiar data are identified on record level, and peculiar rules are mined and explained in a relational mining framework. The results from preliminary experiments show that relational peculiarity oriented mining is very effective.
TMS (Targeted Marketing System) is an integrated system and toolkit for profit-driven and cost-effective marketing. The system consists of three components: a Web-based user interface, a market value inference engine,...
详细信息
ISBN:
(纸本)9780769521008
TMS (Targeted Marketing System) is an integrated system and toolkit for profit-driven and cost-effective marketing. The system consists of three components: a Web-based user interface, a market value inference engine, and a presentation and evaluation module. It supports marketing decision making for a company or an organization by combining results from information retrieval, data mining, informationtheory, and utility theory.
The current debate about the teaching of data structures is hampered because, as a community, we usually debate specifics about data structure implementations and libraries, when the real level of disagreement remains...
详细信息
The current debate about the teaching of data structures is hampered because, as a community, we usually debate specifics about data structure implementations and libraries, when the real level of disagreement remains implicit - the intent behind our teaching. This paper presents a phenomenographic study of the intent of CS educators for teaching data structures in CS2. Based on interviews with computerscience educators and analysis of CS literature, we identified five categories of intent: developing transferable thinking, improving students' programming skills, knowing "what's under the hood", knowledge of software libraries, and component thinking. The CS community needs to first debate at the level of these categories before moving to more specific issues. This study also serves as an example of how phenomenographic analysis can be used to inform debate on syllabus design in general. Copyright 2004 ACM.
A systems engineering approach to integrated control and supervision for applications to industrial multi-zone furnaces has been elaborated and tested in a case study of three-zone 25 MW RZS pusher furnace at Skopje S...
详细信息
A systems engineering approach to integrated control and supervision for applications to industrial multi-zone furnaces has been elaborated and tested in a case study of three-zone 25 MW RZS pusher furnace at Skopje Steelworks. The integrated control and supervision design is based on combined use of general predictive control optimization of set-points, at the upper level, and steady-state decoupling classical two-term laws, at the lower executive control level. For practical engineering and maintenance reasons, digital implementations are sought within standard computer process control platform.
暂无评论