Sciweavers

4923 search results - page 929 / 985
» Software Risk Management
Sort
View
ISSRE
2010
IEEE
13 years 6 months ago
Automata-Based Verification of Security Requirements of Composite Web Services
— With the increasing reliance of complex real-world applications on composite web services assembled from independently developed component services, there is a growing need for...
Hongyu Sun, Samik Basu, Vasant Honavar, Robyn R. L...
GIS
2010
ACM
13 years 5 months ago
Natural neighbor interpolation based grid DEM construction using a GPU
With modern LiDAR technology the amount of topographic data, in the form of massive point clouds, has increased dramatically. One of the most fundamental GIS tasks is to construct...
Alex Beutel, Thomas Mølhave, Pankaj K. Agar...
DKE
2010
136views more  DKE 2010»
13 years 5 months ago
Application integration on the user interface level: An ontology-based approach
Integration of software applications can be achieved on different levels: the data level, the business logic level, and the user interface level. Integration on the user interface ...
Heiko Paulheim, Florian Probst
INFSOF
2010
173views more  INFSOF 2010»
13 years 4 months ago
Filtering false alarms of buffer overflow analysis using SMT solvers
Buffer overflow detection using static analysis can provide a powerful tool for software ers to find difficult bugs in C programs. Sound static analysis based on abstract interpre...
Youil Kim, Jooyong Lee, Hwansoo Han, Kwang-Moo Cho...
TASE
2010
IEEE
13 years 2 months ago
Product Sequencing With Respect to Quality in Flexible Manufacturing Systems With Batch Operations
Abstract--In many flexible manufacturing systems, batch production is often adopted to improve product quality. For example, in automotive paint shops, vehicles with same colors ar...
Junwen Wang, Jingshan Li, Jorge Arinez, Stephan Bi...