Sciweavers

443 search results - page 71 / 89
» Testing for Software Vulnerability Using Environment Perturb...
Sort
View
RE
1999
Springer
13 years 12 months ago
Bridging the Gap Between Past and Future in RE: A Scenario-Based Approach
Requirements Engineering (RE) investigates the impact of a future-oriented change vision, but the move towards this vision must consider a context heavily shaped by the past. As R...
Peter Haumer, Matthias Jarke, Klaus Pohl, Patrick ...
COMCOM
2000
105views more  COMCOM 2000»
13 years 7 months ago
Security broker for multimedia wireless LANs
To secure interactive multimedia applications in wireless LANs WLANs it is pertinent to implement a number of security services such as authentication, key exchange and real-time e...
Aura Ganz, Se Hyun Park, Zvi Ganz
ADBIS
2007
Springer
74views Database» more  ADBIS 2007»
14 years 1 months ago
Preventing Orphan Requests by Integrating Replication and Transactions
Replication is crucial to achieve high availability distributed systems. However, non-determinism introduces consistency problems between replicas. Transactions are very well suite...
Heine Kolltveit, Svein-Olaf Hvasshovd
IPPS
2003
IEEE
14 years 29 days ago
Parallelisation of IBD Computation for Determining Genetic Disease Map
A number of software packages are available for the construction of comprehensive human genetic maps. In this paper we parallelize the widely used package Genehunter. We restrict ...
Nouhad J. Rizk
ISAAC
1995
Springer
135views Algorithms» more  ISAAC 1995»
13 years 11 months ago
The I/O - Complexity of Ordered Binary - Decision Diagram Manipulation
Ordered Binary-Decision Diagrams (OBDD) are the state-of-the-art data structure for boolean function manipulation and there exist several software packages for OBDD manipulation. ...
Lars Arge