Sciweavers

1479 search results - page 158 / 296
» Management without (Detailed) Models
Sort
View
SUTC
2006
IEEE
15 years 10 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
WISE
2002
Springer
15 years 9 months ago
Storing and Maintaining Semistructured Data Efficiently in an Object-Relational Database
We propose to use object-relational database management systems to store and manage semi-structured data. ORA-SS (Object-Relationship-Attribute model for Semi-Structured data) [9]...
Yuanying Mo, Tok Wang Ling
AOSD
2010
ACM
15 years 9 months ago
Composing aspects with aspects
Aspect-oriented programming languages modularize crosscutting concerns by separating the concerns from a base program in aspects. What they do not modularize well is the code need...
Antoine Marot, Roel Wuyts
INFSOF
2007
139views more  INFSOF 2007»
15 years 4 months ago
Predicting software defects in varying development lifecycles using Bayesian nets
An important decision problem in many software projects is when to stop testing and release software for use. For many software products, time to market is critical and therefore ...
Norman E. Fenton, Martin Neil, William Marsh, Pete...
ICFEM
2005
Springer
15 years 10 months ago
A Compositional Framework for Service Interaction Patterns and Interaction Flows
We provide precise high-level models for eight fundamental service interaction patterns, together with schemes for their composition into complex service-based business process int...
Alistair P. Barros, Egon Börger