Sciweavers

1257 search results - page 145 / 252
» Open Source Requirements Engineering
Sort
View
DI
2006
67views more  DI 2006»
15 years 3 months ago
A portable network forensic evidence collector
A small portable network forensic evidence collection device is presented which is built using inexpensive embedded hardware and open source software. The device oers several mode...
Bruce J. Nikkel
JDM
2006
96views more  JDM 2006»
15 years 3 months ago
Preparing Clinical Text for Use in Biomedical Research
Approximately 57 different types of clinical annotations construct a patient's medical record. The annotations include radiology reports, discharge summaries, and surgical an...
John Pestian, Lukasz Itert, Charlotte Anderson, Wl...

Publication
189views
17 years 1 months ago
Packet Trains-Measurements and a New Model for Computer Network Traffic
Traffic measurements on a ring local area computer network at the Massachusetts Institute of Technology are presented. The analysis of the arrival pattern shows that the arrival pr...
R. Jain, S. Routhier
ACISP
2007
Springer
15 years 9 months ago
Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures
The identity of “Deep Throat”, a pseudonym of the information source in the Watergate scandal, remained mysterious for more than three decades. In 2005, an ex-FBI official cla...
Cheng-Kang Chu, Wen-Guey Tzeng
TACAS
2007
Springer
108views Algorithms» more  TACAS 2007»
15 years 9 months ago
State of the Union: Type Inference Via Craig Interpolation
The ad-hoc use of unions to encode disjoint sum types in C programs and the inability of C’s type system to check the safe use of these unions is a long standing source of subtle...
Ranjit Jhala, Rupak Majumdar, Ru-Gang Xu