Sciweavers

739 search results - page 139 / 148
» Web Engineering: The Developers' View and a Practitioner's A...
Sort
View
CGO
2006
IEEE
14 years 1 months ago
BIRD: Binary Interpretation using Runtime Disassembly
The majority of security vulnerabilities published in the literature are due to software bugs. Many researchers have developed program transformation and analysis techniques to au...
Susanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chi...
BMCBI
2006
249views more  BMCBI 2006»
13 years 7 months ago
Gene functional similarity search tool (GFSST)
Background: With the completion of the genome sequences of human, mouse, and other species and the advent of high throughput functional genomic research technologies such as biomi...
Peisen Zhang, Jinghui Zhang, Huitao Sheng, James J...
AINA
2009
IEEE
14 years 2 months ago
Business Compliance Governance in Service-Oriented Architectures
Abstract — Governing business compliance with regulations, laws, best practices, contracts, and the like is not an easy task, and so far there are only limited software products ...
Florian Daniel, Fabio Casati, Vincenzo D'Andrea, E...
ICTAI
2008
IEEE
14 years 2 months ago
Fuzzy Information Retrieval Model Based on Multiple Related Ontologies
– With the World Wide Web popularity the information retrieval area has a new challenge intending to retrieve information resources by their meaning by using a knowledge base. No...
Maria Angelica A. Leite, Ivan L. M. Ricarte
ICSOC
2007
Springer
14 years 1 months ago
User-Driven Service Lifecycle Management - Adopting Internet Paradigms in Telecom Services
The user-centric service creation paradigm set out in Web 2.0 technologies on the Internet allows users to define and share their new content and applications. Open services and in...
Juan C. Yelmo, Rubén Trapero, José M...