Sciweavers

922 search results - page 44 / 185
» Controllability and Observability of Second Order Descriptor...
Sort
View
RE
2010
Springer
14 years 4 months ago
Effort and Quality of Recovering Requirements-to-Code Traces: Two Exploratory Experiments
Trace links between requirements and code are essential for many software development and maintenance activities. Despite significant advances in traceability research, creating li...
Alexander Egyed, Florian Graf, Paul Grünbache...
DAC
2009
ACM
15 years 10 months ago
Energy-aware error control coding for Flash memories
The use of Flash memories in portable embedded systems is ever increasing. This is because of the multi-level storage capability that makes them excellent candidates for high dens...
Veera Papirla, Chaitali Chakrabarti
SAC
2008
ACM
14 years 9 months ago
Workflow management versus case handling: results from a controlled software experiment
Business Process Management (BPM) technology has become an important instrument for improving process performance. When considering its use, however, enterprises typically have to...
Bela Mutschler, Barbara Weber, Manfred Reichert
INFOCOM
2006
IEEE
15 years 3 months ago
A Quasi-Species Approach for Modeling the Dynamics of Polymorphic Worms
— Polymorphic worms can change their byte sequence as they replicate and propagate, thwarting the traditional signature analysis techniques used by many intrusion detection syste...
Bradley Stephenson, Biplab Sikdar
SACMAT
2010
ACM
15 years 2 months ago
Role updating for assignments
The role-based access control (RBAC) has significantly simplified the management of users and permissions in computing systems. In dynamic environments, systems are usually unde...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu