Sciweavers

1654 search results - page 29 / 331
» Comparing Two Software Design Process Theories
Sort
View
ICDCS
2002
IEEE
15 years 2 months ago
ControlWare: A Middleware Architecture for Feedback Control of Software Performance
Attainment of software performance assurances in open, largely unpredictable environments has recently become an important focus for real-time research. Unlike closed embedded sys...
Ronghua Zhang, Chenyang Lu, Tarek F. Abdelzaher, J...
DESRIST
2009
Springer
137views Education» more  DESRIST 2009»
15 years 2 months ago
Coordination analysis: a method for deriving use cases from process dependencies
Despite the widespread recognition that information technology (IT) and business process are tightly connected, existing system design methods provide limited guidance on how to t...
Xiang Michelle Liu, George M. Wyner
ECOOPW
1997
Springer
15 years 2 months ago
The Object Model for a Product Based Development Process
The traditional workflow process model is typically illustrated with a graph of activities, tasks, deliverables and techniques. From an object-oriented perspective, every identifi...
Pavel Hruby
BMCBI
2007
88views more  BMCBI 2007»
14 years 10 months ago
Use of DNA melting simulation software for in silico diagnostic assay design: targeting regions with complex melting curves and
Background: DNA melting curve analysis using double-stranded DNA-specific dyes such as SYTO9 produce complex and reproducible melting profiles, resulting in the detection of multi...
John P. Rasmussen, Christopher P. Saint, Paul T. M...
ICC
2007
IEEE
114views Communications» more  ICC 2007»
15 years 4 months ago
Two-Factor Localized Authentication Scheme for WLAN Roaming
- In the paper, we propose an efficient two-factor localized authentication scheme suitable for WLAN roaming. The proposed authentication scheme can greatly improve the security co...
Xiaodong Lin, Haojin Zhu, Pin-Han Ho, Xuemin Shen