Sciweavers

1308 search results - page 104 / 262
» Application of Hazard Analysis to Software Quality Modelling
Sort
View
DILS
2009
Springer
15 years 7 months ago
An Integration and Analysis Pipeline for Systems Biology in Crop Plant Metabolism
Abstract. To advance the comprehension of complex biological processes occurring in crop plants (e.g. for improvement of growth or yield) it is of high interest to reconstruct and ...
Stephan Weise, Christian Colmsee, Eva Grafahrend-B...
HICSS
2010
IEEE
152views Biometrics» more  HICSS 2010»
15 years 8 months ago
Increasing Software Security through Open Source or Closed Source Development? Empirics Suggest that We have Asked the Wrong Que
While many theoretical arguments against or in favor of open source and closed source software development have been presented, the empirical basis for the assessment of arguments...
Guido Schryen, Eliot Rich
152
Voted
CODES
2010
IEEE
15 years 1 months ago
Worst-case performance analysis of synchronous dataflow scenarios
Synchronous Dataflow (SDF) is a powerful analysis tool for regular, cyclic, parallel task graphs. The behaviour of SDF graphs however is static and therefore not always able to ac...
Marc Geilen, Sander Stuijk
123
Voted
ESEM
2008
ACM
15 years 5 months ago
An empirical model to predict security vulnerabilities using code complexity metrics
Complexity is often hypothesized to be the enemy of software security. If this hypothesis is true, complexity metrics may be used to predict the locale of security problems and ca...
Yonghee Shin, Laurie Williams
150
Voted
OTM
2009
Springer
15 years 10 months ago
Ontology-Driven Provenance Management in eScience: An Application in Parasite Research
Provenance, from the French word “provenir”, describes the lineage or history of a data entity. Provenance is critical information in scientific applications to verify experime...
Satya Sanket Sahoo, D. Brent Weatherly, Raghava Mu...