Sciweavers

3193 search results - page 558 / 639
» A Security Risk Analysis Model for Information Systems
Sort
View
BMCBI
2010
154views more  BMCBI 2010»
13 years 9 months ago
An eScience-Bayes strategy for analyzing omics data
Background: The omics fields promise to revolutionize our understanding of biology and biomedicine. However, their potential is compromised by the challenge to analyze the huge da...
Martin Eklund, Ola Spjuth, Jarl E. S. Wikberg
MMAS
2004
Springer
14 years 2 months ago
Agent Server Technology for Managing Millions of Agents
d to submit first an abstract (to signal your interest and contribution) and then a full paper (for review) to the workshop. All accepted papers will be published as a volume from ...
Gaku Yamamoto
PROMISE
2010
13 years 3 months ago
Prediction of defect distribution based on project characteristics for proactive project management
As software has been pervasive and various software projects have been executed since the 1970s, software project management has played a significant role in software industry. Th...
Youngki Hong, Wondae Kim, Jeongsoo Joo
WWW
2009
ACM
14 years 9 months ago
Discovering users' specific geo intention in web search
Discovering users' specific and implicit geographic intention in web search can greatly help satisfy users' information needs. We build a geo intent analysis system that...
Xing Yi, Hema Raghavan, Chris Leggetter
IRI
2003
IEEE
14 years 2 months ago
A Formal Framework for Design Component Contracts
– Building large software systems out of existing software components can save time and cost. These software components range from architectural and design components to binary c...
Jing Dong, Paulo S. C. Alencar, Donald D. Cowan