Sciweavers

423 search results - page 52 / 85
» Formal access control analysis in the software development p...
Sort
View
HICSS
2007
IEEE
181views Biometrics» more  HICSS 2007»
14 years 3 months ago
A Methodology to Evaluate Agent Oriented Software Engineering Techniques
Systems using Software Agents (or Multi-Agent Systems, MAS) are becoming more popular within the development mainstream because, as the name suggests, an Agent aims to handle task...
Chia-En Lin, Krishna M. Kavi, Frederick T. Sheldon...
ASM
2010
ASM
14 years 3 months ago
Secrecy UML Method for Model Transformations
Abstract. This paper introduces the subject of secrecy models development by transformation, with formal validation. In an enterprise, constructing a secrecy model is a participato...
Waël Hassan, Nadera Slimani, Kamel Adi, Luigi...
GLOBECOM
2009
IEEE
14 years 3 months ago
MAC Protocol Engine for Sensor Networks
—We present a novel approach for Medium Access Control (MAC) protocol design based on protocol engine. Current way of designing MAC protocols for a specific application is based...
Sinem Coleri Ergen, Piergiuseppe Di Marco, Carlo F...
BMCBI
2007
156views more  BMCBI 2007»
13 years 9 months ago
Bio: : NEXUS: a Perl API for the NEXUS format for comparative biological data
Background: Evolutionary analysis provides a formal framework for comparative analysis of genomic and other data. In evolutionary analysis, observed data are treated as the termin...
Thomas Hladish, Vivek Gopalan, Chengzhi Liang, Wei...
METRICS
2005
IEEE
14 years 2 months ago
Visualizing Historical Data Using Spectrographs
Studying the evolution of long lived processes such as the development history of a software system or the publication history of a research community, requires the analysis of a ...
Ahmed E. Hassan, Jingwei Wu, Richard C. Holt