Sciweavers

1728 search results - page 255 / 346
» An approach to integration testing based on architectural de...
Sort
View
ICEBE
2007
IEEE
174views Business» more  ICEBE 2007»
15 years 4 months ago
Worksheet-Driven UMM Modeling of B2B Services
In the development process of a B2B system it is crucial that the business experts are able to express and evaluate agreements and commitments between the partners and that the so...
Christian Huemer, Marco Zapletal, Philipp Liegl, R...
ACSAC
2002
IEEE
15 years 2 months ago
Composable Tools For Network Discovery and Security Analysis
Security analysis should take advantage of a reliable knowledge base that contains semantically-rich information about a protected network. This knowledge is provided by network m...
Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richa...
BMCBI
2010
125views more  BMCBI 2010»
14 years 10 months ago
Asymmetric microarray data produces gene lists highly predictive of research literature on multiple cancer types
Background: Much of the public access cancer microarray data is asymmetric, belonging to datasets containing no samples from normal tissue. Asymmetric data cannot be used in stand...
Noor B. Dawany, Aydin Tozeren
TASLP
2008
115views more  TASLP 2008»
14 years 9 months ago
Recognition of Dialogue Acts in Multiparty Meetings Using a Switching DBN
Abstract--This paper is concerned with the automatic recognition of dialogue acts (DAs) in multiparty conversational speech. We present a joint generative model for DA recognition ...
Alfred Dielmann, Steve Renals
IPAW
2010
14 years 7 months ago
Provenance of Software Development Processes
Abstract. "Why does the build fail currently?" - This and similar questions arise on a daily basis in software development processes (SDP). There is no easy way to answer...
Heinrich Wendel, Markus Kunde, Andreas Schreiber