To see the other types of publications on this topic, follow the link: Executable models.

Journal articles on the topic 'Executable models'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Executable models.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Bicevskis, Janis, Zane Bicevska, and Girts Karnitis. "Executable Data Quality Models." Procedia Computer Science 104 (2017): 138–45. http://dx.doi.org/10.1016/j.procs.2017.01.087.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lazăr, Codruţ-Lucian, Ioan Lazăr, Bazil Pârv, Simona Motogna, and István-Gergely Czibula. "Tool Support for fUML Models." International Journal of Computers Communications & Control 5, no. 5 (2010): 775. http://dx.doi.org/10.15837/ijccc.2010.5.2237.

Full text
Abstract:
In this paper we present a tool chain that aids in the construction of executable UML models according to the new Foundational UML (fUML) standard. These executable models can be constructed and tested in the modeling phase, and code can be generated from them towards different platforms. The fUML standard is currently built and promoted by OMG for building executable UML models. The compatibility of the executable models with the fUML standard means that only the UML elements allowed by fUML should be used for the abstract syntax and the extra constraints imposed by the fUML standard should b
APA, Harvard, Vancouver, ISO, and other styles
3

Clarke, Matthew A., and Jasmin Fisher. "Executable cancer models: successes and challenges." Nature Reviews Cancer 20, no. 6 (2020): 343–54. http://dx.doi.org/10.1038/s41568-020-0258-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zinky, John A., and Joshua Etkin. "Troubleshooting throughput bottlenecks using executable models." Computer Networks and ISDN Systems 24, no. 1 (1992): 33–43. http://dx.doi.org/10.1016/0169-7552(92)90102-v.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cohen, Moshe S. "The Impact of Executable Requirements Models." INCOSE International Symposium 7, no. 1 (1997): 288–95. http://dx.doi.org/10.1002/j.2334-5837.1997.tb02184.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Nader, Kesserwan, Al-Jaroodi Jameela, and Mohamed Nader. "Transforming Software Requirements into Test Cases via Model Transformation." International Journal of Software Engineering & Applications (IJSEA) 14, no. 4 (2023): 1–18. https://doi.org/10.5281/zenodo.8228634.

Full text
Abstract:
Executable test cases originate at the onset of testing as abstract requirements that represent system behavior. Their manual development is time-consuming, susceptible to errors, and expensive. Translating system requirements into behavioral models and then transforming them into a scripting language has the potential to automate their conversion into executable tests. Ideally, an effective testing process should start as early as possible, refine the use cases with ample details, and facilitate the creation of test cases. We propose a methodology that enables automation in converting functio
APA, Harvard, Vancouver, ISO, and other styles
7

Eker, Steven, Merrill Knapp, Keith Laderoute, Patrick Lincoln, and Carolyn Talcott. "Pathway Logic: Executable Models of Biological Networks." Electronic Notes in Theoretical Computer Science 71 (April 2004): 144–61. http://dx.doi.org/10.1016/s1571-0661(05)82533-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Maheshwari, Apoorv, C. Robert Kenley, and Daniel A. DeLaurentis. "Creating Executable Agent-Based Models Using SysML." INCOSE International Symposium 25, no. 1 (2015): 1263–77. http://dx.doi.org/10.1002/j.2334-5837.2015.00128.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wagenhals, Lee W., Sajjad Haider, and Alexander H. Levis. "Synthesizing executable models of object oriented architectures." Systems Engineering 6, no. 4 (2003): 266–300. http://dx.doi.org/10.1002/sys.10049.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Graw, Günter, and Peter Herrmann. "Transformation and Verification of Executable UML Models." Electronic Notes in Theoretical Computer Science 101 (November 2004): 3–24. http://dx.doi.org/10.1016/j.entcs.2004.09.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Fuentes, Lidia, and Pablo Sánchez. "Designing and Weaving Aspect-Oriented Executable UML Models." Journal of Object Technology 6, no. 7 (2007): 109. http://dx.doi.org/10.5381/jot.2007.6.7.a5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Gibson, Corrina, Robert Karban, Luigi Andolfato, and John Day. "Abstractions for Executable and Checkable Fault Management Models." Procedia Computer Science 28 (2014): 146–54. http://dx.doi.org/10.1016/j.procs.2014.03.019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Planas, Elena, Jordi Cabot, and Cristina Gómez. "Lightweight and static verification of UML executable models." Computer Languages, Systems & Structures 46 (November 2016): 66–90. http://dx.doi.org/10.1016/j.cl.2016.07.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Kesserwan, Nader, Jameela Al-Jaroodi, Nader Mohamed, and Imad Jawhar. "Transforming Software Requirements into Test Cases via Model Transformation." International Journal of Software Engineering & Applications 14, no. 04 (2023): 1–18. http://dx.doi.org/10.5121/ijsea.2023.14401.

Full text
Abstract:
Executable test cases originate at the onset of testing as abstract requirements that represent system behavior. Their manual development is time-consuming, susceptible to errors, and expensive. Translating system requirements into behavioral models and then transforming them into a scripting language has the potential to automate their conversion into executable tests. Ideally, an effective testing process should start as early as possible, refine the use cases with ample details, and facilitate the creation of test cases.We propose a methodology that enables automation in converting function
APA, Harvard, Vancouver, ISO, and other styles
15

Zachary, Wayne, Joan Ryder, Thomas Santarelli, and Monica Z. Weiland. "Applications for Executable Cognitive Models: A Case-Study Approach." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 44, no. 6 (2000): 737–40. http://dx.doi.org/10.1177/154193120004400653.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Phillips, R. W. "State change architecture: a protocol for executable process models." ACM SIGSOFT Software Engineering Notes 14, no. 4 (1989): 129–32. http://dx.doi.org/10.1145/75111.75134.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Mens, Tom, Alexandre Decan, and Nikolaos I. Spanoudakis. "A method for testing and validating executable statechart models." Software & Systems Modeling 18, no. 2 (2018): 837–63. http://dx.doi.org/10.1007/s10270-018-0676-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Horváth, Benedek, Vince Molnár, Bence Graics, et al. "Pragmatic verification and validation of industrial executable SysML models." Systems Engineering 26, no. 6 (2023): 693–714. https://doi.org/10.1002/sys.21679.

Full text
Abstract:
In recent years, Model-Based Systems Engineering (MBSE) practices have been applied in various industries to design, simulate and verify complex systems. The verification and validation (V&V) of such systems engineering models are crucial to develop high-quality systems. However, this is a challenging problem due to the complexity of the models and semantic differences in how different tools interpret the models, which can undermine the validity of the obtained results if they go undiscovered. To address these issues, we propose (i) a subset of the SysML language for which the practical se
APA, Harvard, Vancouver, ISO, and other styles
19

Gyori, Benjamin M., John A. Bachman, Kartik Subramanian, Jeremy L. Muhlich, Lucian Galescu, and Peter K. Sorger. "From word models to executable models of signaling networks using automated assembly." Molecular Systems Biology 13, no. 11 (2017): 954. http://dx.doi.org/10.15252/msb.20177651.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

HOUDEK, FRANK, THILO SCHWINN, and DIETMAR ERNST. "DEFECT DETECTION FOR EXECUTABLE SPECIFICATIONS — AN EXPERIMENT." International Journal of Software Engineering and Knowledge Engineering 12, no. 06 (2002): 637–55. http://dx.doi.org/10.1142/s0218194002001128.

Full text
Abstract:
The deployment of executable specifications has increased significantly in the last few years. Just as with any other specification documents, these specifications must be examined to ensure the necessary degree of quality. A common and successful technique used for examining traditional specifications is inspection. Now the question has arisen whether inspections on executable specification are the best choice, or if other techniques which use the execution capabilities of the models perform better. In this paper, we empirically compare several defect detection techniques for executable speci
APA, Harvard, Vancouver, ISO, and other styles
21

Claeys, Filip H. A., Peter Fritzson, and Peter A. Vanrolleghem. "Generating efficient executable models for complex virtual experimentation with the Tornado kernel." Water Science and Technology 56, no. 6 (2007): 65–73. http://dx.doi.org/10.2166/wst.2007.581.

Full text
Abstract:
Virtual experimentation is a collective term that includes various model evaluation procedures such as simulation, optimization and scenario analysis. Given the complexity of the models used in these procedures, and the number of evaluations that is required to complete them, highly efficient model implementations are desired. Although water quality management is a domain in which complex virtual experimentation is often adopted, only relatively little attention has thus far been devoted to the automated generation of efficient executable models. This article reports on a number of promising r
APA, Harvard, Vancouver, ISO, and other styles
22

Thabit, Hamdan, Rami Ahmad, Ahmad Abdullah, Abedallah Zaid Abualkishik, and Ali A. Alwan. "Detecting Malicious .NET Executables Using Extracted Methods Names." AI 6, no. 2 (2025): 20. https://doi.org/10.3390/ai6020020.

Full text
Abstract:
The .NET framework is widely used for software development, making it a target for a significant number of malware attacks by developing malicious executables. Previous studies on malware detection often relied on developing generic detection methods for Windows malware that were not tailored to the unique characteristics of .NET executables. As a result, there remains a significant knowledge gap regarding the development of effective detection methods tailored to .NET malware. This work introduces a novel framework for detecting malicious .NET executables using statically extracted method nam
APA, Harvard, Vancouver, ISO, and other styles
23

Dendere, Tanatswa Ruramai, and Avinash Singh. "Ransomware Detection Using Portable Executable Imports." International Conference on Cyber Warfare and Security 19, no. 1 (2024): 66–74. http://dx.doi.org/10.34190/iccws.19.1.2031.

Full text
Abstract:
In recent years, there has been a substantial surge in ransomware attacks, wreaking havoc on both organizations and individuals. These attacks, driven by the lure of profits, particularly with the widespread use of cryptocurrencies, have prompted attackers to continuously develop innovative evasion techniques and obfuscation tactics to avoid detection. Ransomware, employing seemingly benign functions such as encryption and file-locking, poses a formidable challenge for detection as it evolves beyond traditional signature-based methods. Consequently, there is a growing need to identify previous
APA, Harvard, Vancouver, ISO, and other styles
24

GUVEN, Mesut. "Leveraging deep learning and image conversion of executable files for effective malware detection: A static malware analysis approach." AIMS Mathematics 9, no. 6 (2024): 15223–45. http://dx.doi.org/10.3934/math.2024739.

Full text
Abstract:
<abstract><p>The escalating sophistication of malware poses a formidable security challenge, as it evades traditional protective measures. Static analysis, an initial step in malware investigation, involves code scrutiny without actual execution. One static analysis approach employs the conversion of executable files into image representations, harnessing the potency of deep learning models. Convolutional neural networks (CNNs), particularly adept at image classification, have potential for malware detection. However, their inclination towards structured data requires a preprocessi
APA, Harvard, Vancouver, ISO, and other styles
25

XU, DIANXIANG, WEIFENG XU, and W. ERIC WONG. "AUTOMATED TEST CODE GENERATION FROM CLASS STATE MODELS." International Journal of Software Engineering and Knowledge Engineering 19, no. 04 (2009): 599–623. http://dx.doi.org/10.1142/s0218194009004313.

Full text
Abstract:
This paper presents an approach to automated generation of executable test code from class models represented by the UML protocol state machines. It supports several coverage criteria for state models, including state coverage, transition coverage, and basic and extended round-trip coverage. It allows the tester to add and modify detailed test parameters (e.g., actual arguments for method invocations and implementation-specific environments) if necessary. When the state model is modified due to requirements change, the hand-crafted test parameters, if still valid, are automatically reused. Thi
APA, Harvard, Vancouver, ISO, and other styles
26

Taha, Walid, Paul Brauner, Robert Cartwright, Verónica Gaspes, Aaron Ames, and Alexandre Chapoutot. "A core language for executable models of cyber physical systems." ACM SIGBED Review 8, no. 2 (2011): 39–43. http://dx.doi.org/10.1145/2000367.2000376.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Graf, Philipp, and Klaus D. Muller-Glaser. "Gaining Insight into Executable Models during Runtime: Architecture and Mappings." IEEE Distributed Systems Online 8, no. 3 (2007): 1. http://dx.doi.org/10.1109/mdso.2007.14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Csukás, B., S. Balogh, S. Kováts, A. Aranyi, Z. Kocsis, and L. Bartha. "Process design by controlled simulation of the executable structural models." Computers & Chemical Engineering 23 (June 1999): S569—S572. http://dx.doi.org/10.1016/s0098-1354(99)80140-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Gutierrez, María de los M., and Horacio P. Leone. "DE2M: An environment for developing distributed and executable enterprise models." Advances in Engineering Software 47, no. 1 (2012): 80–103. http://dx.doi.org/10.1016/j.advengsoft.2011.12.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Harel, David, and Assaf Marron. "The quest for runware: on compositional, executable and intuitive models." Software & Systems Modeling 11, no. 4 (2012): 599–608. http://dx.doi.org/10.1007/s10270-012-0258-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Peñil, P., J. Medina, H. Posadas, and E. Villar. "Generating heterogeneous executable specifications in SystemC from UML/MARTE models." Innovations in Systems and Software Engineering 6, no. 1-2 (2009): 65–71. http://dx.doi.org/10.1007/s11334-009-0105-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Wagenhals, Lee W., Insub Shin, and Alexander H. Levis. "Creating executable models of influence nets with colored Petri nets." International Journal on Software Tools for Technology Transfer (STTT) 2, no. 2 (1998): 168–81. http://dx.doi.org/10.1007/s100090050025.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Genrich, Hartmann, Robert Küffner, and Klaus Voss. "Executable Petri net models for the analysis of metabolic pathways." International Journal on Software Tools for Technology Transfer 3, no. 4 (2001): 394–404. http://dx.doi.org/10.1007/s100090100058.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Szeidl, László, and Péter Várlaki. "HOSVD Based Canonical Form for Polytopic Models of Dynamic Systems." Journal of Advanced Computational Intelligence and Intelligent Informatics 13, no. 1 (2009): 52–60. http://dx.doi.org/10.20965/jaciii.2009.p0052.

Full text
Abstract:
The higher order singular-value-based canonical form of linear parameter varying models we define, extracts a models's most important invariant characteristics. We studied the numerical reconstructibility of the canonical form using a routinely executable tractable uniform method, and present convergency theorems for given numerical reconstruction constraint.
APA, Harvard, Vancouver, ISO, and other styles
35

Tang, Xue Song, Qing Hua Meng, Zhi Hong Dong, and Da Guang Lou. "Command and Control System Executable Modeling Researching." Advanced Materials Research 629 (December 2012): 864–67. http://dx.doi.org/10.4028/www.scientific.net/amr.629.864.

Full text
Abstract:
We proceed from the perspective of object-oriented analysis and design modeling, focusing on the model design of command and control automation system, using Colored Petri Net (CPN) to a command and control systems for dynamic design and simulation run. A method of mapping from UML product can be used for logical, behavioral and performance aspects of architecture evaluation methods of CPN executable models is proposed. We first descript the command and control system for UML modeling generally, and then elaborate the process from UML products are mapped to the CPN build executable model of th
APA, Harvard, Vancouver, ISO, and other styles
36

Cao, Yue, and C. S. George Lee. "Ground Manipulator Primitive Tasks to Executable Actions Using Large Language Models." Proceedings of the AAAI Symposium Series 2, no. 1 (2024): 502–7. http://dx.doi.org/10.1609/aaaiss.v2i1.27720.

Full text
Abstract:
Layered architectures have been widely used in robot systems. The majority of them implement planning and execution functions in separate layers. However, there still lacks a straightforward way to transit high-level tasks in the planning layer to the low-level motor commands in the execution layer. In order to tackle this challenge, we propose a novel approach to ground the manipulator primitive tasks to robot low-level actions using large language models (LLMs). We designed a program-function-like prompt based on the task frame formalism. In this way, we enable LLMs to generate position/forc
APA, Harvard, Vancouver, ISO, and other styles
37

Mordechai, Asaf Achi, Yoav Goldberg, and Reut Tsarfaty. "NoviCode: Generating Programs from Natural Language Utterances by Novices." Transactions of the Association for Computational Linguistics 12 (2024): 1330–45. http://dx.doi.org/10.1162/tacl_a_00694.

Full text
Abstract:
Abstract Current Text-to-Code models demonstrate impressive capabilities in generating executable code from natural language snippets. However, current studies focus on technical instructions and programmer-oriented language, and it is an open question whether these models can effectively translate natural language descriptions given by non-technical users and express complex goals, to an executable program that contains an intricate flow—composed of API access and control structures as loops, conditions, and sequences. To unlock the challenge of generating a complete program from a plain non-
APA, Harvard, Vancouver, ISO, and other styles
38

Pfaff, Mark S., Gary L. Klein, and Jill D. Egeth. "Characterizing Crowdsourced Data Collected Using DESIM (Descriptive to Executable Simulation Modeling)." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 61, no. 1 (2017): 178–82. http://dx.doi.org/10.1177/1541931213601529.

Full text
Abstract:
Across many case studies, the Descriptive to Executable Simulation Modeling (DESIM) method has demonstrated the ability to capture and model qualitative knowledge from multiple subject-matter experts (SMEs), convert those models to an executable form using a crowdsourcing approach, and interactively visualize the outputs. This method helps decision makers leverage collective expertise to perform complex “What if?” analysis. This paper takes advantage of a large-scale multiple-model application of DESIM to illustrate the nature and interpretation of the data produced throughout its multiple pha
APA, Harvard, Vancouver, ISO, and other styles
39

Zhang, Yunchun, Jiaqi Jiang, Chao Yi, et al. "A Robust CNN for Malware Classification against Executable Adversarial Attack." Electronics 13, no. 5 (2024): 989. http://dx.doi.org/10.3390/electronics13050989.

Full text
Abstract:
Deep-learning-based malware-detection models are threatened by adversarial attacks. This paper designs a robust and secure convolutional neural network (CNN) for malware classification. First, three CNNs with different pooling layers, including global average pooling (GAP), global max pooling (GMP), and spatial pyramid pooling (SPP), are proposed. Second, we designed an executable adversarial attack to construct adversarial malware by changing the meaningless and unimportant segments within the Portable Executable (PE) header file. Finally, to consolidate the GMP-based CNN, a header-aware loss
APA, Harvard, Vancouver, ISO, and other styles
40

Alqahtani, Ali, Sumayya Azzony, Leen Alsharafi, and Maha Alaseri. "Web-Based Malware Detection System Using Convolutional Neural Network." Digital 3, no. 3 (2023): 273–85. http://dx.doi.org/10.3390/digital3030017.

Full text
Abstract:
In this article, we introduce a web-based malware detection system that leverages a deep-learning approach. Our primary objective is the development of a robust deep-learning model designed for classifying malware in executable files. In contrast to conventional malware detection systems, our approach relies on static detection techniques to unveil the true nature of files as either malicious or benign. Our method makes use of a one-dimensional convolutional neural network 1D-CNN due to the nature of the portable executable file. Significantly, static analysis aligns perfectly with our objecti
APA, Harvard, Vancouver, ISO, and other styles
41

Keišs, Andris, and Ina Komarova. "BUSINESS PROCESS MODELS IN DIFFERENT MODELING LANGUAGES." HUMAN. ENVIRONMENT. TECHNOLOGIES. Proceedings of the Students International Scientific and Practical Conference, no. 21 (April 19, 2017): 135–39. http://dx.doi.org/10.17770/het2017.21.3593.

Full text
Abstract:
The business objective is often to increase process speed or reduce cycle time; to increase quality; or to reduce costs, such as labor, materials, scrap, or capital costs. In practice, a management decision to invest in business process modeling is often motivated by the need to document requirements for an information technology project.Change management programs are typically involved to put any improved business processes into practice. With advances in software design, the vision of BPM models becoming fully executable (and capable of simulations and round-trip engineering) is coming close
APA, Harvard, Vancouver, ISO, and other styles
42

JEUSFELD, MANFRED A., and UWE A. JOHNEN. "AN EXECUTABLE META MODEL FOR RE-ENGINEERING OF DATABASE SCHEMAS." International Journal of Cooperative Information Systems 04, no. 02n03 (1995): 237–58. http://dx.doi.org/10.1142/s021884309500010x.

Full text
Abstract:
A logical database schema, e.g. a relational one, is the implementation of a specification, e.g. an entity-relationship diagram. Upcoming new data models require a cost-effective method for mapping from one data model to the other. We present an approach where the mapping process is divided into three parts. The first part reformulates the source and target data models into a so-called meta model. The second part classifies the input schema into the meta model, yielding a data model-independent representation. The third part synthesizes the output schema in terms of the target data model. The
APA, Harvard, Vancouver, ISO, and other styles
43

Marian, Gheorghe. "Computational Models in Systems and Synthetic Biology: Short Overview." Archives of Biotechnology and Biomedicine 8, no. 1 (2024): 001–2. http://dx.doi.org/10.29328/journal.abb.1001037.

Full text
Abstract:
Computational models used in specifying biological systems represent a complement and become an alternative to more widely used mathematical models. Amongst some of the advantages brought by these computational models, one can mention their executable semantics and mechanistic way of describing biological system phenomena. This short overview report enumerated some of the computational models utilised so far in systems and synthetic biology, the associated analysis and formal verification methods and tools, and a way of facilitating a broader use of this alternative approach.
APA, Harvard, Vancouver, ISO, and other styles
44

Jeong, Young-Seob, Jiyoung Woo, and Ah Reum Kang. "Malware Detection on Byte Streams of Hangul Word Processor Files." Applied Sciences 9, no. 23 (2019): 5178. http://dx.doi.org/10.3390/app9235178.

Full text
Abstract:
While the exchange of data files or programs on the Internet grows exponentially, most users are vulnerable to infected files, especially to malicious non-executables. Due to the circumstances between South and North Korea, many malicious actions have recently been found in Hangul Word Processor (HWP) non-executable files because the HWP is widely used in schools, military facilities, and government institutions of South Korea. The HWP file usually has one or more byte streams that are often used for the malicious actions. Based on an assumption that infected byte streams have particular patte
APA, Harvard, Vancouver, ISO, and other styles
45

Katz, Tami. "Evaluation of Requirements Management Processes Utilizing System Modeling Language (SysML) Executable Models." INCOSE International Symposium 31, no. 1 (2021): 551–69. http://dx.doi.org/10.1002/j.2334-5837.2021.00854.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Zachary, Wayne, Joan Ryder, James Hicinbothom, and Kevin Bracken. "The Use of Executable Cognitive Models in Simulation-Based Intelligent Embedded Training." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 41, no. 2 (1997): 1118–22. http://dx.doi.org/10.1177/107118139704100287.

Full text
Abstract:
This paper defines a new role for expert models in intelligent embedded training — guiding practice. The integration of problem-based practice with focused, automated instruction has long proven elusive in training systems for complex real-world domains. The training strategy of ‘guided practice’ offers a way to merge the approaches of traditional simulation-based practice and intelligent tutoring's knowledge tracing. The performance of the trainee is dynamically assessed against scenario-specific expectations and performance standards, which are generated during the simulation by embedded mod
APA, Harvard, Vancouver, ISO, and other styles
47

Zafar, Iqra, Farooque Azam, Muhammad Waseem Anwar, Bilal Maqbool, Wasi Haider Butt, and Aiman Nazir. "A Novel Framework to Automatically Generate Executable Web Services From BPMN Models." IEEE Access 7 (2019): 93653–77. http://dx.doi.org/10.1109/access.2019.2927785.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Haydarlou, Reza, Annika Jacobsen, Nicola Bonzanni, K. Anton Feenstra, Sanne Abeln, and Jaap Heringa. "BioASF: a framework for automatically generating executable pathway models specified in BioPAX." Bioinformatics 32, no. 12 (2016): i60—i69. http://dx.doi.org/10.1093/bioinformatics/btw250.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Schopper, Dominik, Karl Kübler, Stephan Rudolph, and Oliver Riedel. "EIPPM—The Executable Integrative Product-Production Model." Computers 10, no. 6 (2021): 72. http://dx.doi.org/10.3390/computers10060072.

Full text
Abstract:
In this paper, a combination of graph-based design and simulation-based engineering (SBE) into a new concept called Executable Integrative Product-Production Model (EIPPM) is elaborated. Today, the first collaborative process in engineering for all mechatronic disciplines is the virtual commissioning phase. The authors see a hitherto untapped potential for the earlier, integrated and iterative use of SBE for the development of production systems (PS). Seamless generation of and exchange between Model-, Software- and Hardware-in-the-Loop simulations is necessary. Feedback from simulation result
APA, Harvard, Vancouver, ISO, and other styles
50

Akella, Ashlesha, and Krishnasuri Narayanam. "Data Wrangling Task Automation Using Code-Generating Language Models." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 28 (2025): 29616–18. https://doi.org/10.1609/aaai.v39i28.35344.

Full text
Abstract:
Ensuring data quality in large tabular datasets is a critical challenge, typically addressed through data wrangling tasks. Traditional statistical methods, though efficient, cannot often understand the semantic context and deep learning approaches are resource-intensive, requiring task and dataset-specific training. We present an automated system that utilizes large language models to generate executable code for tasks like missing value imputation, error detection, and error correction. Our system aims to identify inherent patterns in the data while leveraging external knowledge, effectively
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!