Sciweavers

950 search results - page 143 / 190
» Constraint Based Resilience Analysis
Sort
View
ISMIS
2005
Springer
14 years 1 months ago
Statistical Database Modeling for Privacy Preserving Database Generation
Abstract. Testing of database applications is of great importance. Although various studies have been conducted to investigate testing techniques for database design, relatively fe...
Xintao Wu, Yongge Wang, Yuliang Zheng
RE
2005
Springer
14 years 1 months ago
Multi-Dimensional Separation of Concerns in Requirements Engineering
Existing requirements engineering approaches manage broadly scoped requirements and constraints in a fashion that is largely two-dimensional, where functional requirements serve a...
Ana Moreira, Awais Rashid, João Araú...
IPTPS
2003
Springer
14 years 26 days ago
On the Feasibility of Peer-to-Peer Web Indexing and Search
This paper discusses the feasibility of peer-to-peer full-text keyword search of the Web. Two classes of keyword search techniques are in use or have been proposed: flooding of q...
Jinyang Li, Boon Thau Loo, Joseph M. Hellerstein, ...
ISEC
2001
Springer
180views ECommerce» more  ISEC 2001»
14 years 3 days ago
i-Cube: A Tool-Set for the Dynamic Extraction and Integration of Web Data Content
Over the past decade the Internet has evolved into the largest public community in the world. It provides a wealth of data content and services in almost every field of science, t...
Frankie Poon, Kostas Kontogiannis
IJIPT
2008
191views more  IJIPT 2008»
13 years 7 months ago
ARPM: Agent-based Routing Protocol for MANET
Mobile ad-hoc networks (MANETs) are infrastructure-less networks where no central network management exists, composed of mobile nodes over wireless links. Network topology in MANE...
Helen Bakhsh, Manal Abdullah