Sciweavers

1662 search results - page 254 / 333
» Privately Finding Specifications
Sort
View
IEEESP
2006
108views more  IEEESP 2006»
13 years 11 months ago
Defining Misuse within the Development Process
abstraction a use case model offers makes it an appropriate startingpointforsoftwaresecurityanalysis and design activities. In contrast, a misuse case describes potential system be...
Gunnar Peterson, John Steven
JSAC
2006
174views more  JSAC 2006»
13 years 11 months ago
Integrated Radio Resource Allocation for Multihop Cellular Networks With Fixed Relay Stations
Recently, the notion that a logical next step towards future mobile radio networks is to introduce multihop relaying into cellular networks, has gained wide acceptance. Nevertheles...
Yajian Liu, Reza Hoshyar, X. Yang, Rahim Tafazolli
SIGMETRICS
2008
ACM
13 years 11 months ago
Ironmodel: robust performance models in the wild
Traditional performance models are too brittle to be relied on for continuous capacity planning and performance debugging in many computer systems. Simply put, a brittle model is ...
Eno Thereska, Gregory R. Ganger
BMCBI
2005
94views more  BMCBI 2005»
13 years 11 months ago
Reproducible Clusters from Microarray Research: Whither?
Motivation: In cluster analysis, the validity of specific solutions, algorithms, and procedures present significant challenges because there is no null hypothesis to test and no &...
Nikhil R. Garge, Grier P. Page, Alan P. Sprague, B...
BMCBI
2005
105views more  BMCBI 2005»
13 years 11 months ago
Secondary structure assignment that accurately reflects physical and evolutionary characteristics
Background: Secondary structure is used in hierarchical classification of protein structures, identification of protein features, such as helix caps and loops, for fold recognitio...
Maria Vittoria Cubellis, Fabien Cailliez, Simon C....