Sciweavers

4330 search results - page 775 / 866
» Analyzing security architectures
Sort
View
ISMB
1993
15 years 4 months ago
Protein Sequencing Experiment Planning Using Analogy
Experiment design and execution is a central activity in the natural sciences. The SeqERsystem provides a general architecture for the integration of automated planning techniques...
Brian P. Kettler, Lindley Darden
WCE
2007
15 years 4 months ago
An Approach to Test Aspect-oriented Programs
— Software testing is a perennial problem, consequently it scores scant attention. An inclusion to testing challenges is aspect-oriented paradigm, which has a dichotomy of core a...
M. N. Qamar, Aziz Nadeem, R. Aziz
140
Voted
CIDR
2009
161views Algorithms» more  CIDR 2009»
15 years 4 months ago
A Case for A Collaborative Query Management System
Over the past 40 years, database management systems (DBMSs) have evolved to provide a sophisticated variety of data management capabilities. At the same time, tools for managing q...
Nodira Khoussainova, Magdalena Balazinska, Wolfgan...
133
Voted
DGO
2009
118views Education» more  DGO 2009»
15 years 4 months ago
Towards collaborative web-based impact assessment
Impact assessment (IA) is a key method for the legislator to evaluate policies, norms or regulations currently under development. Experts use IA to gather and analyze input from m...
Clemens Heidinger, Erik Buchmann, Klemens Böh...
143
Voted
MOBICOM
2010
ACM
15 years 3 months ago
Side channel: bits over interference
Interference is a critical issue in wireless communications. In a typical multiple-user environment, different users may severely interfere with each other. Coordination among use...
Kaishun Wu, Haoyu Tan, Yunhuai Liu, Jin Zhang, Qia...