Sciweavers

1023 search results - page 131 / 205
» Renaissance: A Method to Support Software System Evolution
Sort
View
SP
2000
IEEE
105views Security Privacy» more  SP 2000»
15 years 8 months ago
Open Source in Security: Visiting the Bizarre
Although open-source software development has virtues, there is reason to believe that the approach would not have a significant effect on the security of today’s systems. The ...
Fred B. Schneider
FSKD
2007
Springer
102views Fuzzy Logic» more  FSKD 2007»
15 years 6 months ago
Statistical and Fuzzy Approach for Database Security
A new type of database anomaly is described by addressing the concept of Cumulated Anomaly in this paper. Dubiety-Determining Model (DDM), which is a detection model basing on sta...
Gang Lu, Junkai Yi, Kevin Lü
MICCAI
2003
Springer
16 years 5 months ago
VETOT, Volume Estimation and Tracking Over Time: Framework and Validation
We have implemented an effective and publicly available tool, VETOT, to track and quantify the evolution of tumors and organs over time. VETOT includes a framework both for registr...
Jean-Philippe Guyon, Mark Foskey, Jisung Kim, Zeyn...
APSEC
2009
IEEE
15 years 7 months ago
Sequence Diagram Slicing
Software visualization with sequence diagrams is one of the promising techniques aimed at helping developers comprehend the behavior of object-oriented systems effectively. However...
Kunihiro Noda, Takashi Kobayashi, Kiyoshi Agusa, S...
142
Voted
KBSE
2000
IEEE
15 years 8 months ago
Systematic Generation of Dependable Change Coordination Plans for Automated Switching of Coordination Policies
Distributed information systems for decision support and e-commerce applications require coordination of multiple autonomous components and their services to accomplish a set of g...
Prasanta K. Bose, Mark G. Matthews