Sciweavers

4250 search results - page 117 / 850
» Understanding the Requirements on Modelling Techniques
Sort
View
ISESE
2005
IEEE
14 years 2 months ago
Risk analysis terminology for IT-systems: does it match intuition?
Many risk specific concepts like “threat”, “consequence” and “risk” belong to the daily language. In a risk analysis one cannot be certain that the participants’ int...
Ida Hogganvik, Ketil Stølen
ICSE
2005
IEEE-ACM
14 years 2 months ago
Component-based software engineering for embedded systems
Although attractive, CBD has not been widely adopted in domains of embedded systems. The main reason is inability of these technologies to cope with the important concerns of embe...
Ivica Crnkovic
AGI
2008
13 years 10 months ago
Fusing Animals and Humans
AI has many techniques and tools at its disposal, yet seems to be lacking some special "juice" needed to create a true being. We propose that the missing ingredients are ...
Jonathan Connell
FSKD
2010
Springer
270views Fuzzy Logic» more  FSKD 2010»
13 years 10 months ago
Ontology-based knowledge discovery and sharing in bioinformatics and medical informatics: A brief survey
Abstract--Worldwide health scientists are producing, accessing, analyzing, integrating, and storing massive amounts of digital medical data daily, through observation, experimentat...
Jingshan Huang, Dejing Dou, Lei He, Pat Hayes, Jia...
SIGMOD
2004
ACM
173views Database» more  SIGMOD 2004»
14 years 9 months ago
Relaxed Currency and Consistency: How to Say "Good Enough" in SQL
Despite the widespread and growing use of asynchronous copies to improve scalability, performance and availability, this practice still lacks a firm semantic foundation. Applicati...
Hongfei Guo, Jonathan Goldstein, Per-Åke Lar...