Sciweavers

2056 search results - page 324 / 412
» Software Architectural Design Meets Security Engineering
Sort
View
KDD
2009
ACM
296views Data Mining» more  KDD 2009»
14 years 9 months ago
Anonymizing healthcare data: a case study on the blood transfusion service
: Gaining access to high-quality health data is a vital requirement to informed decision making for medical practitioners and pharmaceutical researchers. Driven by mutual benefits ...
Noman Mohammed, Benjamin C. M. Fung, Patrick C. K....
ICSE
2005
IEEE-ACM
14 years 9 months ago
Use of relative code churn measures to predict system defect density
Software systems evolve over time due to changes in requirements, optimization of code, fixes for security and reliability bugs etc. Code churn, which measures the changes made to...
Nachiappan Nagappan, Thomas Ball
HICSS
2007
IEEE
124views Biometrics» more  HICSS 2007»
14 years 3 months ago
POSAML: A Visual Modeling Framework for Middleware Provisioning
Effective provisioning of next generation distributed applications hosted on diverse middleware platforms incurs significant challenges due to the applications’ growing complex...
Dimple Kaul, Arundhati Kogekar, Aniruddha S. Gokha...
CHI
2005
ACM
14 years 9 months ago
Extensible input handling in the subArctic toolkit
The subArctic user interface toolkit has extensibility as one of its central goals. It seeks not only to supply a powerful library of reusable interactive objects, but also make i...
Scott E. Hudson, Jennifer Mankoff, Ian E. Smith
CASES
2006
ACM
14 years 3 months ago
High-level languages for small devices: a case study
In this paper we study, through a concrete case, the feasibility of using a high-level, general-purpose logic language in the design and implementation of applications targeting w...
Manuel Carro, José F. Morales, Henk L. Mull...