Sciweavers

1622 search results - page 310 / 325
» Deriving Software Process Simulation Model from SPEM-based S...
Sort
View
HT
2010
ACM
13 years 9 months ago
Capturing implicit user influence in online social sharing
Online social sharing sites are becoming very popular nowadays among Web users, who use these sites to share their favourite items and to discover interesting and useful items fro...
Ching-man Au Yeung, Tomoharu Iwata
SIAMAM
2008
82views more  SIAMAM 2008»
13 years 7 months ago
Optical Fiber Drawing and Dopant Transport
Optical fibers are made of glass with different refractive indices in the (inner) core and the (outer) cladding regions. The difference in refractive index arises due to a rapid tr...
Huaxiong Huang, Robert M. Miura, Jonathan J. Wylie
CORR
2010
Springer
172views Education» more  CORR 2010»
13 years 7 months ago
Seeing Through Black Boxes : Tracking Transactions through Queues under Monitoring Resource Constraints
The problem of optimal allocation of monitoring resources for tracking transactions progressing through a distributed system, modeled as a queueing network, is considered. Two for...
Animashree Anandkumar, Ting He, Chatschik Bisdikia...
FMICS
2009
Springer
14 years 2 months ago
A Rigorous Methodology for Composing Services
on Abstraction: a Lightweight Approach to Modelling Concurrency. Javier de Dios and Ricardo Peña Certified Implementation on top of the Java Virtual Machine 19:00 Social dinner + ...
Kenneth J. Turner, Koon Leai Larry Tan
DBSEC
2004
170views Database» more  DBSEC 2004»
13 years 9 months ago
RBAC/MAC Security Analysis and Design for UML
In software construction, analysis investigates the boundary of a system (scope and requirements), its usage and access, and from a security perspective, who needs access to what ...
Thuong Doan, Steven A. Demurjian, Charles E. Phill...