Sciweavers

13977 search results - page 2697 / 2796
» Evolution in complex systems
Sort
View
SEW
2006
IEEE
15 years 8 months ago
Goal-Driven Software Development
Established software development processes focus on delivering software within time and budget according to a set of requirements. However, practical experiences show that neither...
Ingo Schnabel, Markus Pizka
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
15 years 8 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
SSDBM
2006
IEEE
156views Database» more  SSDBM 2006»
15 years 8 months ago
On Data and Visualization Models for Signaling Pathways
Signaling pathways are chains of interacting proteins, through which the cell converts a (usually) extracellular signal into a biological response. The number of known signaling p...
Nattakarn Ratprasartporn, Ali Cakmak, Gultekin &Ou...
115
Voted
ADBIS
2006
Springer
182views Database» more  ADBIS 2006»
15 years 8 months ago
A Middleware-Based Approach to Database Caching
Database caching supports declarative query processing close to the application. Using a full-fledged DBMS as cache manager, it enables the evaluation of specific project-select-...
Andreas Bühmann, Theo Härder, Christian ...
115
Voted
COMPGEOM
2006
ACM
15 years 8 months ago
Algorithms for two-box covering
We study the problem of covering a set of points or polyhedra in 3 with two axis-aligned boxes in order to minimize a function of the measures of the two boxes, such as the sum or...
Esther M. Arkin, Gill Barequet, Joseph S. B. Mitch...
« Prev « First page 2697 / 2796 Last » Next »