Sciweavers

2060 search results - page 412 / 412
» OPM Web - Object-Process Methodology for Developing Web Appl...
Sort
View
JIPS
2010
195views more  JIPS 2010»
13 years 1 months ago
Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques
Abstract--The Internet explosion and the increase in crucial web applications such as ebanking and e-commerce, make essential the need for network security tools. One of such tools...
Aly M. El-Semary, Mostafa Gadal-Haqq M. Mostafa
MEDES
2010
ACM
13 years 1 months ago
Brazilian public software: beyond sharing
This work presents a case of an innovative Brazilian experience of use of free software in public administration as an emergent ecosystem, and the attempt to establish a quality f...
A. M. Alves, Marcelo Schneck de Paula Pessôa
SOCIALCOM
2010
13 years 29 days ago
Learning Influence Propagation of Personal Blogs with Content and Network Analyses
Weblogs (blogs) serve as a gateway to a large blog reader population, so blog authors can potentially influence a large reader population by expressing their thoughts and expertise...
Il-Chul Moon, Dongwoo Kim, Yohan Jo, Alice H. Oh
BMCBI
2008
146views more  BMCBI 2008»
13 years 6 months ago
EST Express: PHP/MySQL based automated annotation of ESTs from expression libraries
Background: Several biological techniques result in the acquisition of functional sets of cDNAs that must be sequenced and analyzed. The emergence of redundant databases such as U...
Robin P. Smith, William J. Buchser, Marcus B. Lemm...
ICSE
2007
IEEE-ACM
14 years 11 days ago
ACL2s: "The ACL2 Sedan"
ACL2 is the latest inception of the Boyer-Moore theorem prover, the 2005 recipient of the ACM Software System Award. In the hands of an expert, it feels like a finely tuned race ...
Peter C. Dillinger, Panagiotis Manolios, Daron Vro...