Sciweavers

4272 search results - page 764 / 855
» A Case for Automatic System Evaluation
Sort
View
ASE
2008
120views more  ASE 2008»
14 years 10 months ago
Requirements model generation to support requirements elicitation: the Secure Tropos experience
In the last years several efforts have been devoted by researchers in the Requirements Engineering community to the development of methodologies for supporting designers during req...
Nadzeya Kiyavitskaya, Nicola Zannone
BMCBI
2010
166views more  BMCBI 2010»
14 years 10 months ago
Accurate peak list extraction from proteomic mass spectra for identification and profiling studies
Background: Mass spectrometry is an essential technique in proteomics both to identify the proteins of a biological sample and to compare proteomic profiles of different samples. ...
Nicola Barbarini, Paolo Magni
IJPP
2008
74views more  IJPP 2008»
14 years 9 months ago
Bandwidth Efficient All-to-All Broadcast on Switched Clusters
We develop an all-to-all broadcast scheme that achieves maximum bandwidth efficiency for clusters with tree topologies. Using our scheme for clusters with cut-through switches, an...
Ahmad Faraj, Pitch Patarasuk, Xin Yuan
JAR
2008
115views more  JAR 2008»
14 years 9 months ago
Formal Models and Analysis of Secure Multicast in Wired and Wireless Networks
The spreading of multicast technology enables the development of group communication and so dealing with digital streams becomes more and more common over the Internet. Given the f...
Roberto Gorrieri, Fabio Martinelli, Marinella Petr...
JSS
2008
97views more  JSS 2008»
14 years 9 months ago
Proactive and reactive multi-dimensional histogram maintenance for selectivity estimation
Many state-of-the-art selectivity estimation methods use query feedback to maintain histogram buckets, thereby using the limited memory efficiently. However, they are "reacti...
Zhen He, Byung Suk Lee, Xiaoyang Sean Wang