Sciweavers

1937 search results - page 310 / 388
» Starting B Specifications from Use Cases
Sort
View
INFSOF
2006
102views more  INFSOF 2006»
15 years 4 months ago
Comparison of software architecture reverse engineering methods
Problems related to interactions between components is a sign of problems with the software architecture of the system and are often costly to fix. Thus it is very desirable to id...
Catherine Stringfellow, C. D. Amory, Dileep Potnur...
ISF
2007
69views more  ISF 2007»
15 years 4 months ago
Assessing the UK policies for broadband adoption
Broadband technology has been introduced to the business community and the public as a rapid way of exploiting the Internet. The benefits of its use (fast reliable connections, an...
Jyoti Choudrie, Anastasia Papazafeiropoulou
123
Voted
JASIS
2007
119views more  JASIS 2007»
15 years 4 months ago
Visualization of the citation impact environments of scientific journals: An online mapping exercise
Aggregated journal-journal citation networks based on the Journal Citation Reports 2004 of the Science Citation Index (5968 journals) and the Social Science Citation Index (1712 j...
Loet Leydesdorff
109
Voted
AGIS
2000
54views more  AGIS 2000»
15 years 4 months ago
The Application of Earth Science Findings to the Practical Problems of Growing Winegrapes
Transforming science findings into practical applications is presented in the specific case of using remote sensing to detect the presence of an infestation of grapevines. The vin...
David L. Peterson, Lee F. Johnson
158
Voted
PVLDB
2010
117views more  PVLDB 2010»
15 years 3 months ago
Building Disclosure Risk Aware Query Optimizers for Relational Databases
Many DBMS products in the market provide built in encryption support to deal with the security concerns of the organizations. This solution is quite effective in preventing data ...
Mustafa Canim, Murat Kantarcioglu, Bijit Hore, Sha...