Sciweavers

324 search results - page 55 / 65
» Detecting common elements of types
Sort
View
IEEESP
2006
108views more  IEEESP 2006»
13 years 7 months ago
Defining Misuse within the Development Process
abstraction a use case model offers makes it an appropriate startingpointforsoftwaresecurityanalysis and design activities. In contrast, a misuse case describes potential system be...
Gunnar Peterson, John Steven
GEOINFORMATICA
2007
148views more  GEOINFORMATICA 2007»
13 years 7 months ago
Assessing the Certainty of Locations Produced by an Address Geocoding System
Addresses are the most common georeferencing resource people use to communicate to others a location within a city. Urban GIS applications that receive data directly fromcitizens,...
Clodoveu A. Davis, Frederico T. Fonseca
BMCBI
2005
101views more  BMCBI 2005»
13 years 7 months ago
TmaDB: a repository for tissue microarray data
Background: Tissue microarray (TMA) technology has been developed to facilitate large, genome-scale molecular pathology studies. This technique provides a high-throughput method f...
Archana Sharma-Oates, Philip Quirke, David R. West...
JKM
2007
161views more  JKM 2007»
13 years 7 months ago
A strategy-based ontology of knowledge management technologies
Purpose – The purpose of this paper is to distinguish and describe knowledge management (KM) technologies according to their support for strategy. Design/methodology/approach â€...
Andre Saito, Katsuhiro Umemoto, Mitsuru Ikeda
CORR
2008
Springer
190views Education» more  CORR 2008»
13 years 6 months ago
Chain-Based Representations for Solid and Physical Modeling
In this paper we show that the (co)chain complex associated with a decomposition of the computational domain, commonly called a mesh in computational science and engineering, can b...
Antonio DiCarlo, Franco Milicchio, Alberto Paoluzz...