Sciweavers

2205 search results - page 331 / 441
» Mutation Operators for Specifications
Sort
View
122
Voted
ECSCW
2001
15 years 4 months ago
Supporting distributed software development by modes of collaboration
Work processes in team based software development need to be structured to minimise and resolve conflicting or divergent work. Current software development methodologies propose wa...
Till Schümmer, Jörg M. Haake
111
Voted
ISSA
2004
15 years 4 months ago
Run-Time Protocol Conformance Verification In Firewalls
Today, business continuity depends significantly on the continuous availability of information systems. It is well-known that such systems must be protected against intrusion and ...
Ulrich Ultes-Nitsche
108
Voted
ECIS
2003
15 years 4 months ago
The value of business intelligence in the context of developing countries
In the corporate context, a combination of constant technological innovation and increasing competitiveness makes the management of information a huge challenge and requires decis...
Maira Petrini, Marlei Pozzebon
ICWS
2003
IEEE
15 years 4 months ago
Accelerated Information Sharing for Law Enforcement (AISLE) Using Web Services
Information sharing is the defining principle for public safety and Web Services is the technology best positioned to facilitate sharing and lower costs. The National Law Enforcem...
Bob Slaski, Gerry Coleman
115
Voted
SSWMC
2004
15 years 4 months ago
The Watermark Evaluation Testbed (WET)
While Digital Watermarking has received much attention in recent years, it is still a relatively young technology. There are few accepted tools/metrics that can be used to evaluat...
Hyung Cook Kim, Hakeem Ogunleye, Oriol Guitart, Ed...