Sciweavers

1169 search results - page 219 / 234
» Simulation in software engineering training
Sort
View
NSPW
2006
ACM
14 years 1 months ago
E-Prime for security: a new security paradigm
This paper details a true and striking paradigm shift: the use of E-Prime for (at least) user-centered security, organizational/enterprise security policies and informal security ...
Steven J. Greenwald
WWW
2005
ACM
14 years 1 months ago
How to make web sites talk together: web service solution
Integrating web sites to provide more efficient services is a very promising way in the Internet. For example searching house for rent based on train system or preparing a holiday...
Hoang Pham Huy, Takahiro Kawamura, Tetsuo Hasegawa
PPPJ
2009
ACM
14 years 13 days ago
Virtual reuse distance analysis of SPECjvm2008 data locality
Reuse distance analysis has been proved promising in evaluating and predicting data locality for programs written in Fortran or C/C++. But its effect has not been examined for ap...
Xiaoming Gu, Xiao-Feng Li, Buqi Cheng, Eric Huang
FCCM
2000
IEEE
122views VLSI» more  FCCM 2000»
14 years 6 days ago
Evaluating Hardware Compilation Techniques
Hardware compilation techniques which use highlevel programming languages to describe and synthesize hardware are gaining popularity. They are especially useful for reconfigurable...
Markus Weinhardt, Wayne Luk
BMCBI
2008
106views more  BMCBI 2008»
13 years 8 months ago
Ontology Design Patterns for bio-ontologies: a case study on the Cell Cycle Ontology
Background: Bio-ontologies are key elements of knowledge management in bioinformatics. Rich and rigorous bio-ontologies should represent biological knowledge with high fidelity an...
Mikel Egaña Aranguren, Erick Antezana, Mart...