Sciweavers

276 search results - page 31 / 56
» Software Security Checklist for the Software Life Cycle
Sort
View
IEE
2002
92views more  IEE 2002»
13 years 8 months ago
Comparison of Web size measures for predicting Web design and authoring effort
: Software practitioners recognise the importance of realistic estimates of effort for the successful management of software projects, the Web being no exception. Estimates are nec...
Emilia Mendes, Nile Mosley, Steve Counsell
KDD
2009
ACM
232views Data Mining» more  KDD 2009»
14 years 9 months ago
Classification of software behaviors for failure detection: a discriminative pattern mining approach
Software is a ubiquitous component of our daily life. We often depend on the correct working of software systems. Due to the difficulty and complexity of software systems, bugs an...
David Lo, Hong Cheng, Jiawei Han, Siau-Cheng Khoo,...
IHI
2012
266views Healthcare» more  IHI 2012»
12 years 4 months ago
A software tool for large-scale sharing and querying of clinical documents modeled using HL7 version 3 standard
We present a novel software tool called CDN (Collaborative Data Network) for large-scale sharing and querying of clinical documents modeled using HL7 v3 standard (e.g., Clinical D...
Praveen R. Rao, Tivakar Komara Swami, Deepthi S. R...
RULEML
2007
Springer
14 years 3 months ago
How Ontologies and Rules Help to Advance Automobile Development
Nowadays the increasing complexity of cars has become a major challenge due to the growing rate of electronic components and software. This trend has an impact on all phases of the...
Thomas Syldatke, Willy Chen, Jürgen Angele, A...
PERCOM
2010
ACM
13 years 7 months ago
Embedding Semantic Product Memories in the web of things
—Today, RFID is used to identify a wide range of work pieces or individual products for tracking their movements through the logistics chain. For future purposes the idea of stor...
Christian Seitz, Christoph Legat, Jörg Neidig