Sciweavers

2005 search results - page 288 / 401
» Business Process Knowledge Modelling: Method and Tool
Sort
View
SAC
2004
ACM
15 years 3 months ago
Using mobile agents as roaming security guards to test and improve security of hosts and networks
1 This paper discusses the design and implementation details of MAST (Mobile Agent-based Security Tool), a new mobile agentbased network security approach. MAST has been designed t...
Marco M. Carvalho, Thomas B. Cowin, Niranjan Suri,...
WSC
2004
14 years 11 months ago
Practical 3D Animation of Multiply Articulated Construction Equipment
This paper presents research that led to the design and implementation of practical 3D animation methods to visualize multiply-articulated construction equipment in 3D animations ...
Vineet R. Kamat, Julio C. Martínez
BIOCOMP
2006
14 years 11 months ago
Marker Gene Selection Evaluation in Brain Tumor Patients Using Parallel Coordinates
Based on microarray gene expression datasets, many statistical methods have been proposed to locate the significant differentially expressed genes (marker genes) among different sa...
Atiq Islam, Khan M. Iftekharuddin, David J. Russom...
LCPC
2009
Springer
15 years 2 months ago
MIMD Interpretation on a GPU
Programming heterogeneous parallel computer systems is notoriously difficult, but MIMD models have proven to be portable across multi-core processors, clusters, and massively paral...
Henry G. Dietz, B. Dalton Young
COMPSAC
2002
IEEE
15 years 2 months ago
Requirements Driven Quality Control
The paper aims at presenting a method of controlling software quality attributes driven by the set of requirements. This is done in three steps: specifying all the requirements, ma...
Stanislaw Szejko