Sciweavers

641 search results - page 102 / 129
» A Framework for Analyzing Configurations of Deployable Softw...
Sort
View
ICDE
1999
IEEE
184views Database» more  ICDE 1999»
14 years 10 months ago
Document Warehousing Based on a Multimedia Database System
Nowadays, structured data such as sales and business forms are stored in data warehouses for decision makers to use. Further, unstructured data such as emails, html texts, images,...
Hiroshi Ishikawa, Kazumi Kubota, Yasuo Noguchi, Ko...
SE
2008
13 years 10 months ago
Collaborative Development of Knowledge Bases in Distributed Requirements Elicitation
: One of the main challenges in distributed software development is the elicitation and management of knowledge regarding system requirements. Due to spatial distribution of involv...
Steffen Lohmann, Thomas Riechert, Sören Auer
EMSOFT
2004
Springer
14 years 2 months ago
Model based estimation and verification of mobile device performance
Performance is an important quality attribute that needs to be and managed proactively. Abstract models of the system are not very useful if they do not produce reasonably accurat...
Gopalakrishna Raghavan, Ari Salomaki, Raimondas Le...
EUROSYS
2008
ACM
14 years 5 months ago
BorderPatrol: isolating events for black-box tracing
Causal request traces are valuable to developers of large concurrent and distributed applications, yet difficult to obtain. Traces show how a request is processed, and can be anal...
Eric Koskinen, John Jannotti
HICSS
2009
IEEE
122views Biometrics» more  HICSS 2009»
14 years 3 months ago
Empirical Estimates and Observations of 0Day Vulnerabilities
We define a 0Day vulnerability to be any vulnerability, in deployed software, that has been discovered by at least one person but has not yet been publicly announced or patched. T...
Miles A. McQueen, Trevor A. McQueen, Wayne F. Boye...