Sciweavers

1477 search results - page 52 / 296
» Criteria for the evaluation of implemented architectures
Sort
View
BMCBI
2008
79views more  BMCBI 2008»
14 years 10 months ago
A high-throughput pipeline for designing microarray-based pathogen diagnostic assays
Background: We present a methodology for high-throughput design of oligonucleotide fingerprints for microarray-based pathogen diagnostic assays. The oligonucleotide fingerprints, ...
Ravi Vijaya Satya, Nela Zavaljevski, Kamal Kumar, ...
WAW
2009
Springer
187views Algorithms» more  WAW 2009»
15 years 4 months ago
Cluster Based Personalized Search
We study personalized web ranking algorithms based on the existence of document clusterings. Motivated by the topic sensitive page ranking of Haveliwala [19], we develop and imple...
Hyun Chul Lee, Allan Borodin
ER
2009
Springer
166views Database» more  ER 2009»
15 years 4 months ago
A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations
Abstract. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes a vulnerability-cent...
Golnaz Elahi, Eric S. K. Yu, Nicola Zannone
SIGIR
1995
ACM
15 years 1 months ago
Design of a Reusable IR Framework
In this paper, we describe the design of a reusable IR framework, called FIRE, that is being implemented to facilitate the development of IR systems. In addition, FIRE is designed...
Gabriele Sonnenberger, Hans-Peter Frei
AOSD
2005
ACM
15 years 3 months ago
Towards just-in-time middleware architectures
Middleware becomes increasingly important in building distributed applications. Conventional middleware systems are designed, implemented, and packaged before applications are dev...
Charles Zhang, Dapeng Gao, Hans-Arno Jacobsen