Sciweavers

2570 search results - page 404 / 514
» Constructing a web information system development methodolog...
Sort
View
RV
2007
Springer
151views Hardware» more  RV 2007»
15 years 4 months ago
Instrumentation of Open-Source Software for Intrusion Detection
A significant number of cyber assaults are attempted against open source internet support software written in C, C++, or Java. Examples of these software packages include the Apac...
William R. Mahoney, William L. Sousan
BMCBI
2008
144views more  BMCBI 2008»
14 years 10 months ago
WGCNA: an R package for weighted correlation network analysis
Background: Correlation networks are increasingly being used in bioinformatics applications. For example, weighted gene co-expression network analysis is a systems biology method ...
Peter Langfelder, Steve Horvath
COOPIS
2002
IEEE
15 years 2 months ago
Well-Founded Optimism: Inheritance in Frame-Based Knowledge Bases
Abstract. F-logic is a popular formalism for knowledge-intensive applications and, especially, for ontology management in Semantic Web. However, the original F-logic’s semantics ...
Guizhen Yang, Michael Kifer
RE
2001
Springer
15 years 2 months ago
The Role of Policy and Stakeholder Privacy Values in Requirements Engineering
Diverse uses of information technology (IT) in organizations affect privacy. Developers of electronic commerce, database management, security mechanisms, telecommunication and col...
Annie I. Antón, Julia Brande Earp, Thomas A...
TSE
2002
105views more  TSE 2002»
14 years 9 months ago
Disaggregating and Calibrating the CASE Tool Variable in COCOMO II
CASE (Computer Aided Software Engineering) tools are believed to have played a critical role in improving software productivity and quality by assisting tasks in software developme...
Jongmoon Baik, Barry W. Boehm, Bert Steece