Sciweavers

180 search results - page 30 / 36
» A lightweight technique for assessing risks in requirements ...
Sort
View
SIGMOD
2005
ACM
127views Database» more  SIGMOD 2005»
14 years 7 months ago
Fossilized Index: The Linchpin of Trustworthy Non-Alterable Electronic Records
As critical records are increasingly stored in electronic form, which tends to make for easy destruction and clandestine modification, it is imperative that they be properly manag...
Qingbo Zhu, Windsor W. Hsu
MM
2004
ACM
142views Multimedia» more  MM 2004»
14 years 25 days ago
Parsing and browsing tools for colonoscopy videos
Colonoscopy is an important screening tool for colorectal cancer. During a colonoscopic procedure, a tiny video camera at the tip of the endoscope generates a video signal of the ...
Yu Cao, Dalei Li, Wallapak Tavanapong, Jung-Hwan O...
BMCBI
2008
129views more  BMCBI 2008»
13 years 7 months ago
EMAAS: An extensible grid-based Rich Internet Application for microarray data analysis and management
Background: Microarray experimentation requires the application of complex analysis methods as well as the use of non-trivial computer technologies to manage the resultant large d...
Geraint Barton, J. C. Abbott, Norie Chiba, D. W. H...
SCN
2008
Springer
147views Communications» more  SCN 2008»
13 years 7 months ago
Privacy-preserving secure relative localization in vehicular networks
Relative location information helps build vehicle topology maps. Such maps provide location information of nearby vehicles to drivers. In building a vehicle topology, one must cons...
Lei Tang, Xiaoyan Hong, Phillip G. Bradford
ICSE
2009
IEEE-ACM
14 years 8 months ago
Tesseract: Interactive visual exploration of socio-technical relationships in software development
Software developers have long known that project success requires a robust understanding of both technical and social linkages. However, research has largely considered these inde...
Anita Sarma, Larry Maccherone, Patrick Wagstrom, J...