Sciweavers

1432 search results - page 271 / 287
» Executable Protocol Models as a Requirements Engineering Too...
Sort
View
TELETRAFFIC
2007
Springer
15 years 3 months ago
Is ALOHA Causing Power Law Delays?
Abstract. Renewed interest in ALOHA-based Medium Access Control (MAC) protocols stems from their proposed applications to wireless ad hoc and sensor networks that require distribut...
Predrag R. Jelenkovic, Jian Tan
INFSOF
2007
139views more  INFSOF 2007»
14 years 9 months ago
Predicting software defects in varying development lifecycles using Bayesian nets
An important decision problem in many software projects is when to stop testing and release software for use. For many software products, time to market is critical and therefore ...
Norman E. Fenton, Martin Neil, William Marsh, Pete...
ICTAI
2010
IEEE
14 years 7 months ago
The BioASP Library: ASP Solutions for Systems Biology
Abstract--Today's molecular biology is confronted with enormous amounts of data, generated by new high-throughput technologies, along with an increasing number of biological m...
Martin Gebser, Arne König, Torsten Schaub, Sv...
DLOG
2007
14 years 11 months ago
Retrospective on Clio: Schema Mapping and Data Exchange in Practice
Clio is a joint research project between the University of Toronto and IBM Almaden Research Center started in 1999 to address both foundational and systems issues related to the ma...
Renée J. Miller
76
Voted
NSPW
2003
ACM
15 years 2 months ago
SELF: a transparent security extension for ELF binaries
The ability to analyze and modify binaries is often very useful from a security viewpoint. Security operations one would like to perform on binaries include the ability to extract...
Daniel C. DuVarney, V. N. Venkatakrishnan, Sandeep...