—Risk assessment is a very important tool to acquire a present and future security status of the network information system. Many risk assessment approaches consider the present ...
Cui Xiaolin, Xiaobin Tan, Zhang Yong, Hongsheng Xi
An approach is presented that automatically determines if a given source code change impacts the design (i.e., UML class diagram) of the system. This allows code-to-design traceab...
Maen Hammad, Michael L. Collard, Jonathan I. Malet...
This paper focuses on a scheme for automated tumor recognition using images acquired during endoscopic sessions. The proposed recognition system is based on multi-layer feed forwa...
S. A. Karkanis, Dimitrios K. Iakovidis, Dimitrios ...
Next generation embedded systems place new demands on an efficient methodology for their design and verification. These systems have to support interaction over a network, multipl...
Josef Fleischmann, Klaus Buchenrieder, Rainer Kres...
This paper is concerned with the design and performance of the telephone directory enquiry system newly adopted in Hong Kong. This system maintains three million telephone records...