Sciweavers

2682 search results - page 445 / 537
» An Iterative-Cyclic Software Process Model
Sort
View
EDBTW
2006
Springer
13 years 11 months ago
Efficient Integrity Checking over XML Documents
The need for incremental constraint maintenance within collections of semi-structured documents has been ever increasing in the last years due to the widespread diffusion of XML. T...
Daniele Braga, Alessandro Campi, Davide Martinengh...
CISSE
2008
Springer
13 years 11 months ago
A New Methodology for Self Localization in Wireless Sensor Networks
Localization is the subject matter that has allured the attention of many researchers in the field of wireless sensor network. It is the process of assigning or computing the locat...
Allon Rai, Sangita Ale, Syed Sajjad Rizvi, Aasia R...
ESORICS
2010
Springer
13 years 10 months ago
k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks
The security risk of a network against unknown zero day attacks has been considered as something unmeasurable since software flaws are less predictable than hardware faults and the...
Lingyu Wang, Sushil Jajodia, Anoop Singhal, Steven...
JSW
2007
134views more  JSW 2007»
13 years 9 months ago
Compositional Patterns of Non-Functional Properties for Contract Negotiation
— Providing powerful and fine-grained capabilities for the analysis and management of non-functional properties is a major challenge for component-based software systems. This a...
Hervé Chang, Philippe Collet
BMCBI
2008
159views more  BMCBI 2008»
13 years 9 months ago
Estimation and testing for the effect of a genetic pathway on a disease outcome using logistic kernel machine regression via log
Background: Growing interest on biological pathways has called for new statistical methods for modeling and testing a genetic pathway effect on a health outcome. The fact that gen...
Dawei Liu, Debashis Ghosh, Xihong Lin