Sciweavers

830 search results - page 133 / 166
» An Evaluation Framework for Business Process Management Prod...
Sort
View
HICSS
2007
IEEE
148views Biometrics» more  HICSS 2007»
14 years 2 months ago
Binding Now or Binding Later: The Performance of UDDI Registries
In service-oriented environments, the fluidity of the marketplace introduces changes in service offerings and subsequent connection failures for users still bound to outdated serv...
M. Brian Blake, Amy Lynn Sliva, Michael zur Muehle...
CIKM
2005
Springer
14 years 2 months ago
A function-based access control model for XML databases
XML documents are frequently used in applications such as business transactions and medical records involving sensitive information. Typically, parts of documents should be visibl...
Naizhen Qi, Michiharu Kudo, Jussi Myllymaki, Hamid...
ISSRE
2007
IEEE
13 years 10 months ago
Data Mining Techniques for Building Fault-proneness Models in Telecom Java Software
This paper describes a study performed in an industrial setting that attempts to build predictive models to identify parts of a Java system with a high probability of fault. The s...
Erik Arisholm, Lionel C. Briand, Magnus Fuglerud
CISIS
2010
IEEE
14 years 3 months ago
Semantic Integration of Heterogeneous Data Sources for Monitoring Frequent-Release Software Projects
Abstract—Open source software teams routinely develop complex software products in frequent-release settings with rather lightweight processes and project documentation. In this ...
Stefan Biffl, Wikan Danar Sunindyo, Thomas Moser
SAC
2004
ACM
14 years 1 months ago
Missing requirements and relationship discovery through proxy viewpoints model
This paper addresses the problem of “missing requirements” in software requirements specification (SRS) expressed in natural language. Due to rapid changes in technology and b...
Seok Won Lee, David C. Rine