Sciweavers

413 search results - page 19 / 83
» It outsourcing maturity model
Sort
View
DSVIS
1997
Springer
13 years 11 months ago
DMVIS: Design, Modelling and Validation of Interactive Systems
Much of the work reported in the first three DSVIS conferences has concentrated on techniques and languages for specifying and developing interactive systems. In this paper, we ar...
Robert E. Fields, Nicholas A. Merriam, Andrew M. D...
CAV
2010
Springer
173views Hardware» more  CAV 2010»
13 years 10 months ago
A Model Checker for AADL
We present a graphical toolset for verifying AADL models, which are gaining widespread acceptance in aerospace, automobile and avionics industries for comprehensively specifying sa...
Marco Bozzano, Alessandro Cimatti, Joost-Pieter Ka...
BMCBI
2006
82views more  BMCBI 2006»
13 years 7 months ago
Transcriptomic response to differentiation induction
Background: Microarrays used for gene expression studies yield large amounts of data. The processing of such data typically leads to lists of differentially-regulated genes. A com...
G. W. Patton, Robert M. Stephens, I. A. Sidorov, X...
OOPSLA
2009
Springer
14 years 1 months ago
S.P.L.O.T.: software product lines online tools
This paper introduces S.P.L.O.T., a Web-based reasoning and configuration system for Software Product Lines (SPLs). The system benefits from mature logic-based reasoning techniq...
Marcílio Mendonça, Moises Branco, Do...
DBSEC
2009
110views Database» more  DBSEC 2009»
13 years 8 months ago
Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients
Existing approaches for protecting sensitive information stored (outsourced) at external "honest-but-curious" servers are typically based on an overlying layer of encrypt...
Valentina Ciriani, Sabrina De Capitani di Vimercat...