Sciweavers

709 search results - page 113 / 142
» Client Needs and the Design Process in Web Projects
Sort
View
EUROMICRO
2005
IEEE
14 years 2 months ago
Software Security Analysis - Execution Phase Audit
Code revision of a leading telecom product was performed, combining manual audit and static analysis tools. On average, one exploitable vulnerability was found for every 4000 line...
Bengt Carlsson, Dejan Baca
BMCBI
2007
129views more  BMCBI 2007»
13 years 8 months ago
A novel approach to sequence validating protein expression clones with automated decision making
Background: Whereas the molecular assembly of protein expression clones is readily automated and routinely accomplished in high throughput, sequence verification of these clones i...
Elena Taycher, Andreas Rolfs, Yanhui Hu, Dongmei Z...
ACMDIS
2004
ACM
14 years 1 months ago
The information discovery framework
This paper continues the movement from technology centered to human centered approaches in the study of tasks that involve finding, understanding, and using information, and tools...
Andruid Kerne, Steven M. Smith
ECIS
2001
13 years 10 months ago
Barriers to effective knowledge management: Action Research Meets Grounded Theory
Despite evidence that the majority of knowledge management (KM) initiatives miscarry, there has been a paucity of critical, in-depth research into the causes of failure. In this p...
David Graham Wastell
PVLDB
2008
146views more  PVLDB 2008»
13 years 8 months ago
Graceful database schema evolution: the PRISM workbench
Supporting graceful schema evolution represents an unsolved problem for traditional information systems that is further exacerbated in web information systems, such as Wikipedia a...
Carlo Curino, Hyun Jin Moon, Carlo Zaniolo