Sciweavers

1268 search results - page 239 / 254
» High Impact Requirements Engineering
Sort
View
BMCBI
2007
99views more  BMCBI 2007»
14 years 10 months ago
The Deuterator: software for the determination of backbone amide deuterium levels from H/D exchange MS data
Background: The combination of mass spectrometry and solution phase amide hydrogen/deuterium exchange (H/D exchange) experiments is an effective method for characterizing protein ...
B. D. Pascal, M. J. Chalmers, S. A. Busby, C. C. M...
TPDS
2008
133views more  TPDS 2008»
14 years 9 months ago
A More Practical Approach for Single-Packet IP Traceback using Packet Logging and Marking
Tracing IP packets back to their origins is an important step in defending the Internet against denial-of-service (DoS) attacks. Two kinds of IP traceback techniques have been prop...
Chao Gong, Kamil Saraç
JSS
2000
86views more  JSS 2000»
14 years 9 months ago
Quantitative analysis of static models of processes
The upstream activities of software development projects are often viewed as both the most important, the least understood, and hence the most problematic. This is particularly no...
Keith Phalp, Martin J. Shepperd
SOFTWARE
2002
14 years 9 months ago
Quality Attributes of Web Software Applications
In only four or five years, the world wide web has changed from a static collection of HTML web pages to a dynamic engine that powers e-commerce, collaborative work, and distribut...
A. Jefferson Offutt
EUROSYS
2006
ACM
15 years 6 months ago
Experiences in building and operating ePOST, a reliable peer-to-peer application
Peer-to-peer (p2p) technology can potentially be used to build highly reliable applications without a single point of failure. However, most of the existing applications, such as ...
Alan Mislove, Ansley Post, Andreas Haeberlen, Pete...