Sciweavers

419 search results - page 54 / 84
» An Automated Approach for Identifying Potential Vulnerabilit...
Sort
View
WWW
2010
ACM
14 years 26 days ago
Redundancy detection in service-oriented systems
This paper addresses the problem of identifying redundant data in large-scale service-oriented information systems. Specifically, the paper puts forward an automated method to pi...
Peep Küngas, Marlon Dumas
RULEML
2005
Springer
14 years 1 months ago
Extending the SweetDeal Approach for e-Procurement Using SweetRules and RuleML
We show the first detailed realistic e-business application scenario that uses and exploits capabilities of the SweetRules V2.1 toolset for e-contracting using the SweetDeal approa...
Sumit Bhansali, Benjamin N. Grosof
RE
2001
Springer
13 years 12 months ago
Issues of Visualized Conflict Resolution
Effective and efficient requirements negotiation is a key to the success of software development efforts. For large projects, this can be especially difficult to do effectively an...
Hoh In, Siddhartha Roy
AADEBUG
1997
Springer
13 years 11 months ago
Modeling Intelligent System Execution as State Transition Diagrams to Support Debugging
Currently, few tools are available for assisting developers with debugging intelligent systems. Because these systems rely heavily on context dependent knowledge and sometimes sto...
Adele E. Howe, Gabriel Somlo
ARCS
2006
Springer
13 years 11 months ago
Large Event Traces in Parallel Performance Analysis
: A powerful and widely-used method for analyzing the performance behavior of parallel programs is event tracing. When an application is traced, performancerelevant events, such as...
Felix Wolf, Felix Freitag, Bernd Mohr, Shirley Moo...