Sciweavers

922 search results - page 45 / 185
» Engineering a complex ontology with time
Sort
View
ERCIMDL
1999
Springer
117views Education» more  ERCIMDL 1999»
15 years 2 months ago
Predicting Indexer Performance in a Distributed Digital Library
Resource discovery in a distributed digital library poses many challenges, one of which is how to choose search engines for query distribution, given a query and a set of search e...
Naomi Dushay, James C. French, Carl Lagoze
APSEC
2007
IEEE
15 years 4 months ago
Modeling and Learning Interaction-based Accidents for Safety-Critical Software Systems
Analyzing accidents is a vital exercise in the development of safety-critical software systems to prevent past accidents from reoccurring in the future. Current practices such as ...
Tariq Mahmood, Edmund Kazmierczak, Tim Kelly, Denn...
EDBTW
2006
Springer
15 years 1 months ago
A Calculus for Propagating Semantic Annotations Through Scientific Workflow Queries
Scientific workflows facilitate automation, reuse, and reproducibility of scientific data management and analysis tasks. Scientific workflows are often modeled as dataflow networks...
Shawn Bowers, Bertram Ludäscher
ICSE
2000
IEEE-ACM
15 years 1 months ago
Software engineering for security: a roadmap
Is there such a thing anymore as a software system that doesn't need to be secure? Almost every softwarecontrolled system faces threats from potential adversaries, from Inter...
Premkumar T. Devanbu, Stuart G. Stubblebine
ACSAC
2008
IEEE
15 years 4 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...