Sciweavers

549 search results - page 74 / 110
» Belief-Based Risk Analysis
Sort
View
EMSOFT
2011
Springer
13 years 11 months ago
Software certification: coding, code, and coders
We describe a certification approach for software development that has been adopted at our organization. JPL develops robotic spacecraft for the exploration of the solar system. T...
Klaus Havelund, Gerard J. Holzmann
CHI
2008
ACM
16 years 6 days ago
Security practitioners in context: their activities and interactions
This study investigates the context of interactions of IT security practitioners, based on a qualitative analysis of 30 interviews and participatory observation. We identify nine ...
Rodrigo Werlinger, Kirstie Hawkey, Konstantin Bezn...
SDM
2009
SIAM
331views Data Mining» more  SDM 2009»
15 years 9 months ago
Privacy Preservation in Social Networks with Sensitive Edge Weights.
With the development of emerging social networks, such as Facebook and MySpace, security and privacy threats arising from social network analysis bring a risk of disclosure of con...
Jie Wang, Jinze Liu, Jun Zhang, Lian Liu
ISMDA
2005
Springer
15 years 5 months ago
Biomedical Image Processing Integration Through INBIOMED: A Web Services-Based Platform
New biomedical technologies need to be integrated for research on complex diseases. It is necessary to combine and analyze information coming from different sources: genetic-molecu...
David Rey, José Crespo, Alberto Anguita, Ju...
ICSE
2001
IEEE-ACM
15 years 4 months ago
Applying WinWin to Quality Requirements: A Case Study
This paper describes the application of the WinWin paradigm to identify and resolve conflicts in a series of real-client, student-developer digital library projects. The paper is ...
Hoh In, Barry W. Boehm, Thomas Lee Rodgers, Michae...