Sciweavers

4636 search results - page 808 / 928
» Application of Linguistic Techniques for Use Case Analysis
Sort
View
CIKM
2009
Springer
15 years 5 months ago
ASIC: algebra-based structural index comparison
Structural indices play a significant role in improving the efficiency of XML query evaluation. Being able to compare various structural indexing techniques is critical for a DBM...
Yuqing Wu, Sofia Brenes, Tejas Totade, Shijin Josh...
CDC
2008
IEEE
170views Control Systems» more  CDC 2008»
15 years 5 months ago
Modeling and control of the protein synthesis process in eukaryotic cells
— Protein synthesis is an essential process of cell cycle and growth in eukaryotic cells. The initiation stage of the translation process is known to be the most crucial in regul...
Nadav S. Bar, Rahmi Lale
91
Voted
EDOC
2007
IEEE
15 years 5 months ago
Modeling and Integrating Aspects into Component Architectures
Dependable software systems are difficult to develop because developers must understand and address several interdependent and pervasive dependability concerns. Features that addr...
Lydia Michotte, Robert B. France, Franck Fleurey
ICDCS
2007
IEEE
15 years 5 months ago
An Empirical Study of Collusion Behavior in the Maze P2P File-Sharing System
Peer-to-peer networks often use incentive policies to encourage cooperation between nodes. Such systems are generally susceptible to collusion by groups of users in order to gain ...
Qiao Lian, Zheng Zhang, Mao Yang, Ben Y. Zhao, Yaf...
IPPS
2007
IEEE
15 years 5 months ago
Transaction Based Authentication Scheme for Mobile Communication: A Cognitive Agent Based Approach
The vulnerable air interface, device level constraints, and insecure encryption techniques of wireless networks have naturally increased the chance of attacker obtaining users inf...
B. Sathish Babu, Pallapa Venkataram