Sciweavers

272 search results - page 12 / 55
» Exploring the acceptability envelope
Sort
View
CAISE
2006
Springer
15 years 1 months ago
Designing Security Requirements Models Through Planning
The quest for designing secure and trusted software has led to refined Software Engineering methodologies that rely on tools to support the design process. Automated reasoning mech...
Volha Bryl, Fabio Massacci, John Mylopoulos, Nicol...
SCIENTOMETRICS
2010
109views more  SCIENTOMETRICS 2010»
14 years 8 months ago
To publish or not to publish? On the aggregation and drivers of research performance
This paper presents a methodology to aggregate multidimensional research output. Using a tailored version of the non-parametric Data Envelopment Analysis model, we account for the...
Kristof De Witte, Nicky Rogge
NSPW
2006
ACM
15 years 3 months ago
Inconsistency in deception for defense
The use of deception is one of many defensive techniques being explored today. In the past, defenders of systems have used deception haphazardly, but now researchers are developin...
Vicentiu Neagoe, Matt Bishop
MDM
2004
Springer
103views Communications» more  MDM 2004»
15 years 2 months ago
Mobile Agents: What about Them? Did They Deliver what They Promised? Are They Here to Stay?
Mobile Agents have brought around a new way to perform computations and develop distributed application and it is now struggling for a visible position in the area of distributed ...
George Samaras
BMCBI
2008
147views more  BMCBI 2008»
14 years 9 months ago
Transmembrane helix prediction using amino acid property features and latent semantic analysis
Background: Prediction of transmembrane (TM) helices by statistical methods suffers from lack of sufficient training data. Current best methods use hundreds or even thousands of f...
Madhavi Ganapathiraju, Narayanas Balakrishnan, Raj...