Sciweavers

1799 search results - page 288 / 360
» Active Objects in TMN
Sort
View
ASWEC
2008
IEEE
15 years 10 months ago
Modeling Input Validation in UML
Security is an integral part of most software systems but it is not considered as an explicit part in the development process yet. Input validation is the most critical part of so...
Pedram Hayati, Nastaran Jafari, S. Mohammad Rezaei...
135
Voted
ASWEC
2008
IEEE
15 years 10 months ago
An Empirical Study of Evolution of Inheritance in Java OSS
Previous studies of Object-Oriented (OO) software have reported avoidance of the inheritance mechanism and cast doubt on the wisdom of ‘deep’ inheritance levels. From an evolu...
Emal Nasseri, Steve Counsell, M. Shepperd
BIBM
2008
IEEE
145views Bioinformatics» more  BIBM 2008»
15 years 10 months ago
Meta Analysis of Microarray Data Using Gene Regulation Pathways
Using microarray technology for genetic analysis in biological experiments requires computationally intensive tools to interpret results. The main objective here is to develop a â...
Saira Ali Kazmi, Yoo-Ah Kim, Baikang Pei, Ravi Nor...
GLOBECOM
2008
IEEE
15 years 10 months ago
Mesh-Based Coverage for Wireless Sensor Networks
—Wireless Sensor Networks (WSNs) consist of spatially-distributed autonomous sensors that can cooperatively monitor physical and environmental conditions. Because of sensors’ r...
Jiong Wang, Sirisha Medidi
HICSS
2008
IEEE
136views Biometrics» more  HICSS 2008»
15 years 10 months ago
Tag Clouds: Data Analysis Tool or Social Signaller?
We examine the recent information visualization phenomenon known as tag clouds, which are an interesting combination of data visualization, web design element, and social marker. ...
Marti A. Hearst, Daniela Karin Rosner