Sciweavers

975 search results - page 184 / 195
» Applying Patterns during Business Process Modeling
Sort
View
SEKE
2010
Springer
13 years 7 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
EDBTW
2010
Springer
13 years 6 months ago
A decision support system to improve e-learning environments
Nowadays, due to the lack of face-to-face contact, distance course instructors have real difficulties knowing who their students are, how their students behave in the virtual cour...
Marta E. Zorrilla, Diego García, Elena &Aac...
GRC
2007
IEEE
14 years 2 months ago
Perceptual Reasoning: A New Computing with Words Engine
— Zadeh proposed the paradigm of computing with words (CWW). We have proposed a CWW architecture for making subjective judgments, called a Perceptual Computer (PerC). Because wor...
Jerry M. Mendel, Dongrui Wu
PERCOM
2006
ACM
14 years 8 months ago
Adaptive Medical Feature Extraction for Resource Constrained Distributed Embedded Systems
Tiny embedded systems have not been an ideal outfit for high performance computing due to their constrained resources. Limitations in processing power, battery life, communication ...
Roozbeh Jafari, Hyduke Noshadi, Majid Sarrafzadeh,...
BMCBI
2006
82views more  BMCBI 2006»
13 years 8 months ago
Transcriptomic response to differentiation induction
Background: Microarrays used for gene expression studies yield large amounts of data. The processing of such data typically leads to lists of differentially-regulated genes. A com...
G. W. Patton, Robert M. Stephens, I. A. Sidorov, X...