Sciweavers

736 search results - page 88 / 148
» Goal-oriented requirement analysis for data warehouse design
Sort
View
79
Voted
ISSA
2008
15 years 2 months ago
The Principle of Security Safeguards: Accidental Activities
The principle of information security safeguards is a key information principle contained in every privacy legislation measure, framework, and guideline. This principle requires d...
Rasika Dayarathna
116
Voted
FUIN
2007
147views more  FUIN 2007»
15 years 16 days ago
Privacy Preserving Database Generation for Database Application Testing
Testing of database applications is of great importance. Although various studies have been conducted to investigate testing techniques for database design, relatively few efforts ...
Xintao Wu, Yongge Wang, Songtao Guo, Yuliang Zheng
89
Voted
WSC
1997
15 years 1 months ago
Applications of the Universal Joint Task List to Joint Exercise Results
The foundation of readiness is training. The Chairman, Joint Chiefs of Staff (CJCS) Joint Training Program institutes methods for identifying training requirements through review ...
Sam H. Parry, Michael C. McAneny, Richard J. Drome...
BMCBI
2008
122views more  BMCBI 2008»
15 years 21 days ago
High-throughput bioinformatics with the Cyrille2 pipeline system
Background: Modern omics research involves the application of high-throughput technologies that generate vast volumes of data. These data need to be pre-processed, analyzed and in...
Mark W. E. J. Fiers, Ate van der Burgt, Erwin Date...
103
Voted
BMCBI
2008
163views more  BMCBI 2008»
15 years 21 days ago
The Annotation, Mapping, Expression and Network (AMEN) suite of tools for molecular systems biology
Background: High-throughput genome biological experiments yield large and multifaceted datasets that require flexible and user-friendly analysis tools to facilitate their interpre...
Frédéric Chalmel, Michael Primig