Sciweavers

358 search results - page 61 / 72
» A Verification Methodology for Model Fields
Sort
View
SIGSOFT
2005
ACM
15 years 10 months ago
Reasoning about confidentiality at requirements engineering time
Growing attention is being paid to application security at requirements engineering time. Confidentiality is a particular subclass of security concerns that requires sensitive inf...
Renaud De Landtsheer, Axel van Lamsweerde
ECMDAFA
2005
Springer
130views Hardware» more  ECMDAFA 2005»
15 years 3 months ago
Control Flow Analysis of UML 2.0 Sequence Diagrams
This article presents a control flow analysis methodology based on UML 2.0 sequence diagrams (SD). In contrast to the conventional code-based control flow analysis techniques, thi...
Vahid Garousi, Lionel C. Briand, Yvan Labiche
CIKM
2010
Springer
14 years 6 months ago
A late fusion approach to cross-lingual document re-ranking
The field of information retrieval still strives to develop models which allow semantic information to be integrated in the ranking process to improve performance in comparison to...
Dong Zhou, Séamus Lawless, Jinming Min, Vin...
ICWS
2009
IEEE
15 years 6 months ago
Wrap Scientific Applications as WSRF Grid Services Using gRAVI
— Web service models are increasingly being used in the Grid community as way to create distributed applications exposing data and/or applications through self describing interfa...
Kyle Chard, Wei Tan, Joshua Boverhof, Ravi K. Madd...
BMCBI
2008
121views more  BMCBI 2008»
14 years 9 months ago
Modularization of biochemical networks based on classification of Petri net t-invariants
Background: Structural analysis of biochemical networks is a growing field in bioinformatics and systems biology. The availability of an increasing amount of biological data from ...
Eva Grafahrend-Belau, Falk Schreiber, Monika Heine...