Sciweavers

1012 search results - page 48 / 203
» Identification of System Software Components Using Clusterin...
Sort
View
COMPSAC
2009
IEEE
14 years 3 months ago
A Contextual Guidance Approach to Software Security
With the ongoing trend towards the globalization of software systems and their development, components in these systems might not only work together, but may end up evolving indep...
Philipp Schügerl, David Walsh, Juergen Rillin...
BMCBI
2010
164views more  BMCBI 2010»
13 years 6 months ago
Merged consensus clustering to assess and improve class discovery with microarray data
Background: One of the most commonly performed tasks when analysing high throughput gene expression data is to use clustering methods to classify the data into groups. There are a...
T. Ian Simpson, J. Douglas Armstrong, Andrew P. Ja...
ITCC
2005
IEEE
14 years 2 months ago
Misuse Case-Based Design and Analysis of Secure Software Architecture
This paper presents an approach to the architectural design and analysis of secure software systems based on the system requirements elicited in the form of use cases and misuse c...
Joshua J. Pauli, Dianxiang Xu
SRDS
2005
IEEE
14 years 2 months ago
Enforcing Enterprise-wide Policies Over Standard Client-Server Interactions
We propose and evaluate a novel framework for enforcing global coordination and control policies over interacting software components in enterprise computing environments. This fra...
Zhijun He, Tuan Phan, Thu D. Nguyen
ASWEC
2008
IEEE
13 years 11 months ago
Root Cause Analysis Using Sequence Alignment and Latent Semantic Indexing
Automatic identification of software faults has enormous practical significance. This requires characterizing program execution behavior. Equally important is the aspect of diagno...
R. P. Jagadeesh Chandra Bose, U. Suresh