Sciweavers

1164 search results - page 224 / 233
» Using CBR for Semantic Analysis of Software Specifications
Sort
View
NSDI
2008
13 years 10 months ago
Designing and Implementing Malicious Hardware
Hidden malicious circuits provide an attacker with a stealthy attack vector. As they occupy a layer below the entire software stack, malicious circuits can bypass traditional defe...
Samuel T. King, Joseph Tucek, Anthony Cozzie, Chri...
BMCBI
2008
169views more  BMCBI 2008»
13 years 7 months ago
MausDB: An open source application for phenotype data and mouse colony management in large-scale mouse phenotyping projects
Background: Large-scale, comprehensive and standardized high-throughput mouse phenotyping has been established as a tool of functional genome research by the German Mouse Clinic a...
Holger Maier, Christoph Lengger, Bruno Simic, Helm...
JUCS
2008
130views more  JUCS 2008»
13 years 7 months ago
Experimenting the Automated Selection of COTS Components Based on Cost and System Requirements
: In a component-based development process the selection of components is an activity that takes place over multiple lifecycle phases that span from requirement specifications thro...
Vittorio Cortellessa, Ivica Crnkovic, Fabrizio Mar...
IPM
2007
143views more  IPM 2007»
13 years 7 months ago
QCS: A system for querying, clustering and summarizing documents
Information retrieval systems consist of many complicated components. Research and development of such systems is often hampered by the difficulty in evaluating how each particula...
Daniel M. Dunlavy, Dianne P. O'Leary, John M. Conr...
AVI
2004
13 years 9 months ago
3Book: a 3D electronic smart book
This paper describes the 3Book, a 3D interactive visualization of a codex book as a component for various digital library and sensemaking systems. The book is designed to hold lar...
Stuart K. Card, Lichan Hong, Jock D. Mackinlay, Ed...