Sciweavers

442 search results - page 63 / 89
» Validation methods for calibrating software effort models
Sort
View
CAISE
2004
Springer
14 years 2 months ago
Towards Computer-aided Design of OCL Constraints
In UML2.0, significant efforts have been devoted towards a better definition of OCL. Still, the adoption of the language by the software engineers remains a significant challenge....
Yves Ledru, Sophie Dupuy-Chessa, Hind Fadil
JAR
2006
81views more  JAR 2006»
13 years 8 months ago
Verifying the SET Purchase Protocols
SET (Secure Electronic Transaction) is a suite of protocols proposed by a consortium of credit card companies and software corporations to secure ecommerce transactions. The Purcha...
Giampaolo Bella, Fabio Massacci, Lawrence C. Pauls...
FUIN
2007
147views more  FUIN 2007»
13 years 8 months ago
Privacy Preserving Database Generation for Database Application Testing
Testing of database applications is of great importance. Although various studies have been conducted to investigate testing techniques for database design, relatively few efforts ...
Xintao Wu, Yongge Wang, Songtao Guo, Yuliang Zheng
WOTE
2010
13 years 6 months ago
Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster
Abstract. While electronic elections promise the possibility of convenient, efficient and secure facilities for recording and tallying votes, recent studies have highlighted inadeq...
Stéphanie Delaune, Steve Kremer, Mark Ryan
BMCBI
2008
108views more  BMCBI 2008»
13 years 8 months ago
A nonparametric model for quality control of database search results in shotgun proteomics
Background: Analysis of complex samples with tandem mass spectrometry (MS/MS) has become routine in proteomic research. However, validation of database search results creates a bo...
Jiyang Zhang, Jianqi Li, Xin Liu, Hongwei Xie, Yun...