Security design at architecture level is critical to achieve high assurance software systems. However, most security design techniques for software architectures were in ad hoc fa...
Huiqun Yu, Dongmei Liu, Xudong He, Li Yang, Shu Ga...
The work described in this paper is an investigation of COTS-based software development within a particular NASA environment, with an emphasis on the processes used. Fifteen proje...
Maurizio Morisio, Carolyn B. Seaman, Victor R. Bas...
Background: Since its inception, proteomics has essentially operated in a discovery mode with the goal of identifying and quantifying the maximal number of proteins in a sample. I...
Mi-Youn K. Brusniak, Sung-Tat Kwok, Mark Christian...
Abstract: Systematic testing of object-oriented software turned out to be much more complex than testing conventional software. Especially the highly incremental and iterative deve...
The integration of heterogeneous data sources with even heterogeneous semantic meanings poses a challenge for data and system integrators. Ontology Alignment (OA) tries to identif...
Thomas Moser, Kathrin Schimper, Richard Mordinyi, ...