Sciweavers

1486 search results - page 96 / 298
» Firewall Rules Analysis
Sort
View
ER
2007
Springer
101views Database» more  ER 2007»
15 years 6 months ago
Using Attributed Goal Graphs for Software Component Selection: An Application of Goal-Oriented Analysis to Decision Making
During software requirements analysis and design steps, developers and stakeholders have many alternatives of artifacts such as software component selection and should make decisi...
Kazuma Yamamoto, Motoshi Saeki
SCAM
2005
IEEE
15 years 5 months ago
Pointer Analysis for Source-to-Source Transformations
We present a pointer analysis algorithm designed for source-to-source transformations. Existing techniques for pointer analysis apply a collection of inference rules to a dismantl...
Marcio Buss, Stephen A. Edwards, Bin Yao, Dan G. W...
BMCBI
2007
159views more  BMCBI 2007»
15 years 20 hour ago
sIR: siRNA Information Resource, a web-based tool for siRNA sequence design and analysis and an open access siRNA database
Background: RNA interference has revolutionized our ability to study the effects of altering the expression of single genes in mammalian (and other) cells through targeted knockdo...
Jyoti K. Shah, Harold R. Garner, Michael A. White,...
IMSCCS
2007
IEEE
15 years 6 months ago
Linear Correlation Analysis of Numeric Attributes for Government Data
To analyze the linear correlations of numeric attributes of government data, this paper proposes a method based on the clustering algorithm. A clustering method is adopted to prun...
Ying Chen, Guochang Gu, Tian-yang Lv, Shaobin Huan...
HICSS
2005
IEEE
127views Biometrics» more  HICSS 2005»
15 years 5 months ago
Enterprise Architecture Analysis with XML
This paper shows how XML can be used for static and dynamic analysis of architectures. Our analysis is based on the distinction between symbolic and semantic models of architectur...
Frank S. de Boer, Marcello M. Bonsangue, Joost Jac...