Sciweavers

2740 search results - page 360 / 548
» A Model-Based Approach To Requirements Analysis
Sort
View
ICDAR
2009
IEEE
15 years 10 months ago
User-Guided Wrapping of PDF Documents Using Graph Matching Techniques
There are a number of established products on the market for wrapping—semi-automatic navigation and extraction of data—from web pages. These solutions make use of the inherent...
Tamir Hassan
ICST
2009
IEEE
15 years 10 months ago
Seasonal Variation in the Vulnerability Discovery Process
Vulnerability discovery rates need to be taken into account for evaluating security risks. Accurate projection of these rates is required to estimate the effort needed to develop ...
HyunChul Joh, Yashwant K. Malaiya
147
Voted
TRUST
2009
Springer
15 years 10 months ago
Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture
During many crises, access to sensitive emergency-support information is required to save lives and property. For example, for effective evacuations first responders need the name...
Timothy E. Levin, Jeffrey S. Dwoskin, Ganesha Bhas...
SOCO
2009
Springer
15 years 10 months ago
A Framework for Testing Model Composition Engines
Model composition helps designers managing complexities by modeling different system views separately, and later compose them into an integrated model. In the past years, researche...
Freddy Munoz, Benoit Baudry
142
Voted
ITNG
2008
IEEE
15 years 10 months ago
A Framework for Agent-Based Trust Management in Online Auctions
Current electronic commerce applications such as online auction systems are not trustworthy due to a lack of effective trust management mechanisms. A trustworthy online auction sy...
Haiping Xu, Sol M. Shatz, Christopher K. Bates