Sciweavers

892 search results - page 56 / 179
» Risks of rapid application development
Sort
View
HICSS
2003
IEEE
98views Biometrics» more  HICSS 2003»
14 years 3 months ago
Effectiveness and Applicability of Internet-Based Training in the Corporation - Case of Egypt
Learning is the most indispensable activity in the current knowledge-based economy where firms, in order to compete and survive, must be constantly alert, capable of adapting to f...
Mohamed Ibrahim
ICECCS
2000
IEEE
126views Hardware» more  ICECCS 2000»
14 years 2 months ago
Domain Modeling of Software Process Models
This paper presents a novel application involving two important Software Engineering research areas: process modeling and software reuse. The Spiral Model is a risk-driven process...
Hassan Gomaa, Larry Kerschberg, Ghulam A. Farrukh
ESORICS
2006
Springer
14 years 1 months ago
Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors
A user who wants to use a service forbidden by their site's usage policy can masquerade their packets in order to evade detection. One masquerade technique sends prohibited tr...
Michael P. Collins, Michael K. Reiter
ISSA
2008
13 years 11 months ago
The Information Security of a Bluetooth-Enabled Handheld Device
Bluetooth connectivity allows workers to access information anywhere, including both personal and corporate information. Software and applications have been specifically developed...
Frankie Tvrz, Marijke Coetzee
BMCBI
2010
139views more  BMCBI 2010»
13 years 10 months ago
CMASA: an accurate algorithm for detecting local protein structural similarity and its application to enzyme catalytic site anno
Background: The rapid development of structural genomics has resulted in many "unknown function" proteins being deposited in Protein Data Bank (PDB), thus, the functiona...
Gong-Hua Li, Jing-Fei Huang