Sciweavers

674 search results - page 96 / 135
» The Impact of Service-Oriented Application Development on So...
Sort
View
ACMSE
2006
ACM
14 years 1 months ago
Static analysis of anomalies and security vulnerabilities in executable files
Software researchers have already developed static code security checkers to parse through and scan source code files, looking for security vulnerabilities [8, 9]. What about exec...
Jay-Evan J. Tevis, John A. Hamilton Jr.
AIM
2006
13 years 9 months ago
Observing the use of BPM tools: A step towards flexibility
: The development of the tools of Business Process Management (BPM) arises from the spread of the notion of process in the management universe. The application of BPM to strategic ...
Joseph Heili, Jean-Mathias Heraud, Laure France
DGO
2009
89views Education» more  DGO 2009»
13 years 8 months ago
Top-level decisions through public deliberation on the internet: evidence from the evolution of Java governance
This study found internet-enabled public deliberation having a direct impact on top-level decisions and it identified institutional mechanisms by which this occurs. Most governmen...
Michael Kaschesky, Reinhard Riedl
IDA
2010
Springer
13 years 6 months ago
Fuzzy-rough approaches for mammographic risk analysis
The accuracy of methods for the assessment of mammographic risk analysis is heavily related to breast tissue characteristics. Previous work has demonstrated considerable success i...
Neil MacParthalain, Richard Jensen, Qiang Shen, Re...
HIPEAC
2009
Springer
14 years 2 months ago
Predictive Runtime Code Scheduling for Heterogeneous Architectures
Heterogeneous architectures are currently widespread. With the advent of easy-to-program general purpose GPUs, virtually every recent desktop computer is a heterogeneous system. Co...
Víctor J. Jiménez, Lluís Vila...