Sciweavers

19003 search results - page 141 / 3801
» We Need Assurance!
Sort
View
CCS
2006
ACM
14 years 29 days ago
An efficient broadcast authentication scheme in wireless sensor networks
A broadcast authentication mechanism is important in wireless sensor networks, assuring receivers of a packet's validity. To provide authentication, some researchers utilize ...
Shang-Ming Chang, Shiuhpyng Shieh, Warren W. Lin, ...
AIRS
2006
Springer
13 years 11 months ago
Text Mining for Medical Documents Using a Hidden Markov Model
Abstract. We propose a semantic tagger that provides high level concept information for phrases in clinical documents. It delineates such information from the statements written by...
Hyeju Jang, Sa-Kwang Song, Sung-Hyon Myaeng
MKWI
2008
147views Business» more  MKWI 2008»
13 years 10 months ago
Process-oriented Test Automation of Configurable Business Solutions
: Along with rapidly changing market requirements for service-oriented business software new challenges for quality management, quality assurance, and testing arise. Customers must...
Benjamin Blau, Hong Tuan Kiet Vo
CATA
2004
13 years 10 months ago
ImageSpace: an Image Ontology Creation and Annotation Tool for the Semantic Web
Ontologies are central to the architecture of the Semantic Web, the next generation Web that is currently under active development. We have developed ImageSpace, an image ontology...
Rong Huang, Shiyong Lu, Farshad Fotouhi
CASCON
2001
106views Education» more  CASCON 2001»
13 years 10 months ago
Using UML to reflect non-functional requirements
The way requirements should drive the rest of the software development process has been a subject of many research projects in the past. Unfortunately, all of them focus primarily...
Luiz Marcio Cysneiros, Julio Cesar Sampaio do Prad...