Sciweavers

794 search results - page 131 / 159
» Automatically Analyzing Software Processes: Experience Repor...
Sort
View
110
Voted
DBSEC
2004
170views Database» more  DBSEC 2004»
15 years 1 months ago
RBAC/MAC Security Analysis and Design for UML
In software construction, analysis investigates the boundary of a system (scope and requirements), its usage and access, and from a security perspective, who needs access to what ...
Thuong Doan, Steven A. Demurjian, Charles E. Phill...
154
Voted
CLEF
2009
Springer
14 years 10 months ago
Medical Image Retrieval: ISSR at CLEF 2009
This paper represents the first participation of the Institute of Statistical Studies and Research at Cairo University group in CLEF 2009-Medical image retrieval track. Our system...
Waleed Arafa, Ragia Ibrahim
112
Voted
BMCBI
2007
129views more  BMCBI 2007»
15 years 18 days ago
A novel approach to sequence validating protein expression clones with automated decision making
Background: Whereas the molecular assembly of protein expression clones is readily automated and routinely accomplished in high throughput, sequence verification of these clones i...
Elena Taycher, Andreas Rolfs, Yanhui Hu, Dongmei Z...
OTM
2009
Springer
15 years 7 months ago
TMBean: Optimistic Concurrency in Application Servers Using Transactional Memory
Abstract. In this experience report, we present an evaluation of different techniques to manage concurrency in the context of application servers. Traditionally, using entity beans...
Lucas Charles, Pascal Felber, Christophe Gêt...
ASPLOS
2011
ACM
14 years 4 months ago
On-the-fly elimination of dynamic irregularities for GPU computing
The power-efficient massively parallel Graphics Processing Units (GPUs) have become increasingly influential for scientific computing over the past few years. However, their ef...
Eddy Z. Zhang, Yunlian Jiang, Ziyu Guo, Kai Tian, ...