Sciweavers

2421 search results - page 232 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
ICSM
2006
IEEE
15 years 10 months ago
Using the Case-Based Ranking Methodology for Test Case Prioritization
The test case execution order affects the time at which the objectives of testing are met. If the objective is fault detection, an inappropriate execution order might reveal most ...
Paolo Tonella, Paolo Avesani, Angelo Susi
ATAL
2008
Springer
15 years 6 months ago
Using SOA Provenance to Implement Norm Enforcement in e-Institutions
In the last 10 years several approaches and technologies other than MAS (such as Web services and Grid computing) have emerged, with the support of the industry, providing their o...
Javier Vázquez-Salceda, Sergio Álvar...
148
Voted
ESWS
2008
Springer
15 years 6 months ago
Enhancing Semantic Search using N-Levels Document Representation
The traditional strategy performed by Information Retrieval (IR) systems is ranked keyword search: For a given query, a list of documents, ordered by relevance, is returned. Releva...
Pierpaolo Basile, Annalina Caputo, Anna Lisa Genti...
BDIM
2007
IEEE
115views Business» more  BDIM 2007»
15 years 4 months ago
Specifying Information Security Needs for the Delivery of High Quality Security Services
In this paper we present an approach for specifying respect to security. When an organization wants to secure and prioritizing information security requirements in organiza- its sy...
Xiaomeng Su, Damiano Bolzoni, Pascal van Eck
116
Voted
MASCOTS
2004
15 years 6 months ago
Performance Characterisation and Verification of JavaSpaces Based on Design of Experiments
In the ever increasing world of distributed systems, different middleware implementations can be compared qualitatively or quantitatively. Existing evaluation techniques are often...
Frederic Hancke, Tom Dhaene, Jan Broeckhove