Sciweavers

641 search results - page 33 / 129
» Identifying Contingency Requirements Using Obstacle Analysis
Sort
View
BMCBI
2005
81views more  BMCBI 2005»
13 years 8 months ago
Evolutionary sequence analysis of complete eukaryote genomes
Background: Gene duplication and gene loss during the evolution of eukaryotes have hindered attempts to estimate phylogenies and divergence times of species. Although current meth...
Jaime E. Blair, Prachi Shah, S. Blair Hedges
FLAIRS
2006
13 years 10 months ago
Design, Implementation and Performance Analysis of Pervasive Surveillance Networks
Pervasive surveillance implies the continuous tracking of multiple targets as they move about the monitored region. The tasks to be performed by a surveillance system are expresse...
Amit Goradia, Zhiwei Cen, Clayton Haffner, Ning Xi...
VLDB
2003
ACM
156views Database» more  VLDB 2003»
14 years 9 months ago
Watermarking relational data: framework, algorithms and analysis
We enunciate the need for watermarking database relations to deter data piracy, identify the characteristics of relational data that pose unique challenges for watermarking, and de...
Rakesh Agrawal, Peter J. Haas, Jerry Kiernan
CORR
2006
Springer
138views Education» more  CORR 2006»
13 years 8 months ago
Applying and Combining Three Different Aspect Mining Techniques
Abstract. Understanding a software system at source-code level requires understanding the different concerns that it addresses, which in turn requires a way to identify these conce...
Mariano Ceccato, Marius Marin, Kim Mens, Leon Moon...
APSCC
2008
IEEE
13 years 10 months ago
Contract-Based Security Monitors for Service Oriented Software Architecture
Monitors have been used for real-time systems to ensure proper behavior; however, most approaches do not allow for the addition of relevant fields required to identify and react t...
Alexander M. Hoole, Issa Traoré