Filters








70,942 Hits in 4.3 sec

Visualizing protected variations in evolving software designs

Sébastien Rufiange, Christopher P. Fuhrman
2014 Journal of Systems and Software  
In this paper, we present a new visual approach to identify variability zones in software designs and explore how they evolve over time.  ...  Identifying and tracking evolving software structures at a design level is a challenging task.  ...  This research was funded in part by FRQ (Fonds de recherche du Québec) and ÉTS.  ... 
doi:10.1016/j.jss.2013.10.044 fatcat:m6lejoz7l5cfrb6ww63ctxy7ny

AniMatrix: A Matrix-Based Visualization of Software Evolution

Sebastien Rufiange, Guy Melancon
2014 2014 Second IEEE Working Conference on Software Visualization  
In this paper, we present an interactive matrix-based visualization technique that, combined with animation, depicts how software designs evolve.  ...  Our generic visualization supports dynamic and weighted digraphs and is applied in the context of software evolution.  ...  Protected Variations. An application of Protected Variations is typically composed of three parts. An interface I is first introduced at some point in time.  ... 
doi:10.1109/vissoft.2014.30 dblp:conf/vissoft/RufiangeM14 fatcat:7xxjeoh24fawnkpb26jzspib7a

An Integrated Decision Support Toolbox (DST) for the Management of Mountain Protected Areas

Birendra Bajracharya, Sudip Pradhan, Basanta Shrestha, Franco Salerno
2010 Mountain Research and Development  
An Integrated Decision Support Toolbox (DST) for the Management of Mountain Protected Areas Birendra Bajracharya 1 *, Sudip Pradhan 1 , Basanta Shrestha 1 , and Franco Salerno 2,3  ...  DST software was designed with the 3 functional modules: scenario analysis, spatial analysis, and knowledge base.  ...  Development of the DST software A modular approach was followed for development of DST software; this was an evolving process, with the functionalities of components being defined or modified during the  ... 
doi:10.1659/mrd-journal-d-09-00048.1 fatcat:y557lp4qjrevbohyow5niqcjsu

Analysis of Protective Relaying Operation and Related Power System Interaction

Mladen Kezunovic, Slavko Vasilic
2003 IFAC Proceedings Volumes  
Advanced techniques for analysing operation of protective relays and related interactions with the power system are discussed.  ...  Such advanced analysis techniques are needed to provide improved protective relaying reliability and system performance. Copyright © 2002 IFAC  ...  A new software for power system modelling and simulation as well as protective relay design and evaluation EMTP, ATP, etc.)  ... 
doi:10.1016/s1474-6670(17)34500-7 fatcat:663xkejqgbfylov2at2amxju7m

The Brave New World of Design Requirements: Four Key Principles [chapter]

Matthias Jarke, Pericles Loucopoulos, Kalle Lyytinen, John Mylopoulos, William Robinson
2010 Lecture Notes in Computer Science  
processes: (1) intertwining of requirements with implementation and organizational contexts, (2) dynamic evolution of requirements, (3) architectures as a critical stabilizing force, and (4) high levels of design  ...  We explore changes in the environment, targets, and the process of requirements engineering (RE) that influence the nature of fundamental RE questions.  ...  This research was in part funded by National Science Foundation's "Science of Design" initiative, Grant Number: CCF0613606, by DFG project CONTICI and by BMBF project ZAMOMO.  ... 
doi:10.1007/978-3-642-13094-6_36 fatcat:hodtuytwwzaljfvfseci2wrguq

Predicting Visual Quality with GIS Based Land-Use Data: An Old Mission Peninsula, Michigan Case Study

M. Noffke, J. B. Burley
2004 Journal American Society of Mining and Reclamation  
Predictive visual quality equations and preference modeling have evolved into important design tools for the landscape architecture profession and reclamation specialists.  ...  We used the Old Mission Peninsula in Grand Traverse County, Michigan and GIS layers for the study area with 3-dimensional visualization software to determine if computer generated images were similar in  ...  In addition, we would also like to thank Gordon Hayward, the Peninsula Township Planner, for his Proceedings America Society of Mining and Reclamation, 2004  ... 
doi:10.21000/jasmr04011376 fatcat:qlqthzb7jraz5naa3zvb4bm4wm

Design for quiet living: tracing the development of projects in noise-affected areas with software-based data analysis and visualization

Cristina Calleri, Louena Shtrepi, Alessandro Armando, Arianna Astolfi
2019 Proceedings of the ICA congress  
However, since softwarebased visualization were judged insufficient for a complete understanding of the process, a second phase of the work was developed to design maps that could answer to specific questions  ...  The case-study is analyzed through qualitative analysis of interviews and documents, conducted through CAQDAS software Atlas.ti.  ...  Through the visualization tool of the software s then possible to visualize how a specific debate evolved around a concern and how interviews expand what can be read in the documents.  ... 
doi:10.18154/rwth-conv-239376 fatcat:frrasenejzccnhdcta6iejebp4

Bio-inspiration: Learning Creative Design Principia [chapter]

Tomasz Arciszewski, Joanna Cornell
2006 Lecture Notes in Computer Science  
Our focus is on human design knowledge acquisition. In particular, we are interested in acquiring abstract design rules from various domains.  ...  MindLink (MindLink Software Corporation), and WorkBench (Ideation International) are based on Brainstorming [7] Synectics [8] and TRIZ (Theory of Solving Inventive Problems) [1], respectively.  ...  In design, visual inspiration can be described as the use of pictures (visuals) of animals or their organs to develop similar-looking engineering systems or system components.  ... 
doi:10.1007/11888598_5 fatcat:fmos3hpaavhj7dbe4rxjh5ndky

Symbiotic view of Provenance in Cyber Infrastrcuture and Information Security

Kukatlapalli Pradeep Kumar, Et. al.
2021 Turkish Journal of Computer and Mathematics Education  
Technology and software tools has grown so broad to an extent, where almost all of the financial transactions are taking place through online portals.  ...  Access specifiers helps us understand degree of rights given to the users in utilizing data records in a right manner.  ...  For the customers who pay for those services, protection for the same is an evolving problem.  ... 
doi:10.17762/turcomat.v12i2.2384 fatcat:d2qdgywcyvg2xlcgczllbkz3se

Upload any object and evolve it: Injecting complex geometric patterns into CPPNS for further evolution

Jeff Clune, Anthony Chen, Hod Lipson
2013 2013 IEEE Congress on Evolutionary Computation  
Any evolvability extant in the original CPPN genome can be assessed by comparing the two, a project we take first steps toward in this paper.  ...  However, the lack of tools to help nontechnical users design interesting, complex objects represents a significant barrier preventing the public from benefiting from 3D printers.  ...  Thus, researchers can learn about the CPPN encoding in particular, and about the nature of evolvability itself, which remains a difficult-to-study, yet important, area of biological research [24] , [  ... 
doi:10.1109/cec.2013.6557986 dblp:conf/cec/CluneCL13 fatcat:vjq52pgd4zfrzh26jgqba3bcoq

Data visualization for network simulations

Christopher S. Main, L. Felipe Perrone, Greg L. Schrock
2014 Proceedings of the Winter Simulation Conference 2014  
A sophisticated body of knowledge in information design and data visualization has been developed and continues to evolve.  ...  The primary contribution of this paper is to explore some of the design dimensions in visualization and some advances in the field that are applicable to network simulation.  ...  For orientation variation to create visual stimulus, the shapes must be linear. Furthermore, the designer of the graphic cannot exploit too many variations on orientation.  ... 
doi:10.1109/wsc.2014.7020149 dblp:conf/wsc/MainPS14 fatcat:mivipjlafjay3lt4breixegrvm

An Effective Code Metrics for Evaluation of Protected Parameters in Database Applications

Varun K L Srivastava, Association of Education Training & Research Institute (ASSOED), Noida
2019 International Journal of Advanced Trends in Computer Science and Engineering  
Huge study investigations predict that software which is object oriented can be achieved before original operation of software using design code proposed by Chidambaram and Kemerer (C&K).  ...  The suggested metric suited might be essentially supportive of the developers over examining the programming protected of information escalated consideration product frameworks in front of deploying them  ...  INTRODUCTION In an evolving domain, programming is additionally inclined to software protected to adjust programming support is single key procedures of the software life cycle.  ... 
doi:10.30534/ijatcse/2019/1681.32019 fatcat:qpuiyu3r5faezmlfodok23naxq

Adversarial genetic programming for cyber security: a rising application domain where GP matters

Una-May O'Reilly, Jamal Toutouh, Marcos Pertierra, Daniel Prado Sanchez, Dennis Garcia, Anthony Erb Luogo, Jonathan Kelly, Erik Hemberg
2020 Genetic Programming and Evolvable Machines  
Adversarial Genetic Programming for Cyber Security encompasses extant and immediate research efforts in a vital problem domain, arguably occupying a position at the frontier where GP matters.  ...  Additionally, it prompts research questions around evolving complex behavior by expressing different abstractions with GP and opportunities to reconnect to the Machine Learning, Artificial Life, Agent-Based  ...  For the defensive designer, it also provides visualizations and comparisons of adversarial behaviors to inform the design process.  ... 
doi:10.1007/s10710-020-09389-y fatcat:pptcxqfc6zeptdstzl3ipewrym

Adversarial Genetic Programming for Cyber Security: A Rising Application Domain Where GP Matters

Una-May O'Reilly, Jamal Toutouh, Marcos Pertierra, Daniel Prado Sanchez, Anthony Erb Luogo, Jonathan Kelly, Erik Hemberg
2020 Zenodo  
Adversarial Genetic Programming for Cyber Security encompasses extant and immediate research efforts in a vital problem domain, arguably occupying a position at the frontier where GP matters.  ...  Additionally, it prompts research questions around evolving complex behavior by expressing different abstractions with GP and opportunities to reconnect to the machine learning, artificial life, agent-based  ...  For the defensive designer, it also provides visualizations and comparisons of adversarial behaviors to inform the design process.  ... 
doi:10.5281/zenodo.4593284 fatcat:mpwyc4xbhbhahlaagf44a22abe

Looking deep into nature: A review of micro-computed tomography in biomimicry

Anton du Plessis, Chris Broeckhoven
2019 Acta Biomaterialia  
The non-destructive nature of microCT, combined with three-dimensional visualization and analysis, allows for the most complete internal and external "view" of natural materials and structures at both  ...  In this review, we show how microCT has been used in bioinspiration and biomimetic studies to date, including investigations of multifunctional structures, hierarchical structures and the growing use of  ...  The protective role of the glyptodont body armour was analyzed in [13] , using microCT scans, simulations and a reverse engineering approach with 3D printing of models with design variations and mechanical  ... 
doi:10.1016/j.actbio.2018.12.014 pmid:30543937 fatcat:7f4o3yte4rgurofe6k3ddwuviq
« Previous Showing results 1 — 15 out of 70,942 results