Sciweavers

2897 search results - page 554 / 580
» Test Case Integration: From Components to Systems
Sort
View
JCDL
2009
ACM
133views Education» more  JCDL 2009»
14 years 3 months ago
Cost and benefit analysis of mediated enterprise search
The utility of an enterprise search system is determined by three key players: the information retrieval (IR) system (the search engine), the enterprise users, and the service pro...
Mingfang Wu, James A. Thom, Andrew Turpin, Ross Wi...
PETRA
2009
ACM
14 years 3 months ago
A technological infrastructure design for a pediatric oncology network
In Italy, the service of Pediatric oncology is very centralized and granted by high-specialized medical structures. In the Italian Regione Campania there are just few of such medi...
Aniello Murano
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
14 years 2 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
HICSS
2003
IEEE
114views Biometrics» more  HICSS 2003»
14 years 2 months ago
Duration in the Digital Economy
We examine the drivers of Internet firm survival using a multi-method survival analysis. Based on previous literature on business failure and recent IS research on e-commerce busi...
Robert J. Kauffman, Bin Wang
KBSE
2007
IEEE
14 years 3 months ago
Exploring the neighborhood with dora to expedite software maintenance
Completing software maintenance and evolution tasks for today’s large, complex software systems can be difficult, often requiring considerable time to understand the system well...
Emily Hill, Lori L. Pollock, K. Vijay-Shanker