Sciweavers

1308 search results - page 178 / 262
» Application of Hazard Analysis to Software Quality Modelling
Sort
View
SIGSOFT
2007
ACM
16 years 5 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna
ISASSCI
2001
15 years 5 months ago
Metadata Driven Data Transformation
The bottleneck of a data warehouse implementation is the ETL (extraction, transformation, and load) process, which carries out the initial population of the data warehouse and its...
Petr Aubrecht, Zdenek Kouba
BMCBI
2006
94views more  BMCBI 2006»
15 years 4 months ago
Simulation of microarray data with realistic characteristics
Background: Microarray technologies have become common tools in biological research. As a result, a need for effective computational methods for data analysis has emerged. Numerou...
Matti Nykter, Tommi Aho, Miika Ahdesmäki, Pek...
TAMODIA
2007
15 years 5 months ago
Exploring Usability Needs by Human-Computer Interaction Patterns
Abstract. Covering quality aspects such as usability through the software development life cycle is challenging. These “-ilities” are generally difficult to grasp and usually ...
Markus Specker, Ina Wentzlaff
IUI
2005
ACM
15 years 9 months ago
A location representation for generating descriptive walking directions
An expressive representation for location is an important component in many applications. However, while many location-aware applications can reason about space at the level of co...
Gary Look, Buddhika Kottahachchi, Robert Laddaga, ...