Sciweavers

1329 search results - page 142 / 266
» The Many Dimensions of the Software Process
Sort
View
MKWI
2008
168views Business» more  MKWI 2008»
13 years 10 months ago
Towards Automated Risk Identification in Service-Oriented Architectures
: IT risk management is an important challenge for businesses and software vulnerabilities are a major source of IT risks, as the 2006 CSI/FBI Computer Crime and Security Survey [G...
Lutz Lowis
ADC
2007
Springer
125views Database» more  ADC 2007»
14 years 3 months ago
Building a Disordered Protein Database: A Case Study in Managing Biological Data
A huge diversity of biological databases is available via the Internet, but many of these databases have been developed in an ad hoc manner rather than in accordance with any data...
Arran D. Stewart, Xiuzhen Zhang
WSC
2008
13 years 11 months ago
Using data driven simulation to build inventory model
Many general-purpose simulation languages (such as ARENA, SLAM II, GPSS/H, SIMAN etc) have been the major simulation tools to simulate the demand-supply processes. They have made ...
Minghui Yang
ICDAR
2009
IEEE
13 years 7 months ago
Learning on the Fly: Font-Free Approaches to Difficult OCR Problems
Despite ubiquitous claims that optical character recognition (OCR) is a "solved problem," many categories of documents continue to break modern OCR software such as docu...
Andrew Kae, Erik G. Learned-Miller
NDSS
2007
IEEE
14 years 3 months ago
Fig: Automatic Fingerprint Generation
Fingerprinting is a widely used technique among the networking and security communities for identifying different implementations of the same piece of networking software running ...
Shobha Venkataraman, Juan Caballero, Pongsin Poosa...