Sciweavers

2015 search results - page 66 / 403
» Hidden Software Capabilities
Sort
View
CL
2010
Springer
13 years 9 months ago
Isolating untrusted software extensions by custom scoping rules
In a modern programming language, scoping rules determine the visibility of names in various regions of a program [15]. In this work, we examine the idea of allowing an applicatio...
Philip W. L. Fong, Simon A. Orr
BMCBI
2005
96views more  BMCBI 2005»
13 years 9 months ago
Evaluating eukaryotic secreted protein prediction
Background: Improvements in protein sequence annotation and an increase in the number of annotated protein databases has fueled development of an increasing number of software too...
Eric W. Klee, Lynda B. M. Ellis
AICCSA
2001
IEEE
131views Hardware» more  AICCSA 2001»
14 years 24 days ago
Modeling Resources in a UML-Based Simulative Environment
The importance of early performance assessment grows as software systems increase in terms of size, logical distribution and interaction complexity. Lack of time from the side of ...
Hany H. Ammar, Vittorio Cortellessa, Alaa Ibrahim
SIGSOFT
2005
ACM
14 years 10 months ago
A case study on value-based requirements tracing
Project managers aim at keeping track of interdependencies between various artifacts of the software development lifecycle, to find out potential requirements conflicts, to better...
Matthias Heindl, Stefan Biffl
MKWI
2008
117views Business» more  MKWI 2008»
13 years 10 months ago
The Emergence of Partnership Networks in the Enterprise Application Development Industry - An SME Perspective
: The IS development industry is currently undergoing profound changes. The well established, large system developers (hubs) take the lead in establishing partner networks with muc...
Jens Arndt, Thomas Kude, Jens Dibbern