Sciweavers

1937 search results - page 89 / 388
» Starting B Specifications from Use Cases
Sort
View
AOSD
2004
ACM
15 years 10 months ago
Deriving security requirements from crosscutting threat descriptions
It is generally accepted that early determination of the stakeholder requirements assists in the development of systems that better meet the needs of those stakeholders. General s...
Charles B. Haley, Robin C. Laney, Bashar Nuseibeh
BMCBI
2007
180views more  BMCBI 2007»
15 years 4 months ago
Splicy: a web-based tool for the prediction of possible alternative splicing events from Affymetrix probeset data
Background: The Affymetrix™ technology is nowadays a well-established method for the analysis of gene expression profiles in cancer research studies. However, changes in gene ex...
Davide Rambaldi, Barbara Felice, Viviane Praz, Phi...
ECIS
2004
15 years 5 months ago
Value-based business modelling for network organizations: lessons learned from the electricity sector
Speed and availability of information, delivered in past years by Internet technologies, made it easier for any company to outsource primary activities, which resulted in unbundli...
Vera Kartseva, Jaap Gordijn, Yao-Hua Tan
CIG
2006
IEEE
15 years 10 months ago
A Coevolutionary Model for The Virus Game
— In this paper, coevolution is used to evolve Artificial Neural Networks (ANN) which evaluate board positions of a two player zero-sum game (The Virus Game). The coevolved neura...
Peter I. Cowling, M. H. Naveed, M. A. Hossain
ACL
2010
15 years 2 months ago
Pseudo-Word for Phrase-Based Machine Translation
The pipeline of most Phrase-Based Statistical Machine Translation (PB-SMT) systems starts from automatically word aligned parallel corpus. But word appears to be too fine-grained ...
Xiangyu Duan, Min Zhang, Haizhou Li