Sciweavers

5439 search results - page 145 / 1088
» Patterns: from system design to software testing
Sort
View
85
Voted
TEC
2002
166views more  TEC 2002»
14 years 9 months ago
An artificial immune system architecture for computer security applications
With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect ...
Paul K. Harmer, Paul D. Williams, Gregg H. Gunsch,...
EUROPLOP
2006
14 years 11 months ago
Patterns for Adaptive Service-Centric Systems
Service-centric systems are driven more and more towards self-adaptation in order to satisfy QoS in highly dynamic environments. However, the young age and immaturity of this doma...
Paris Avgeriou
KDD
2002
ACM
112views Data Mining» more  KDD 2002»
15 years 10 months ago
From run-time behavior to usage scenarios: an interaction-pattern mining approach
A key challenge facing IT organizations today is their evolution towards adopting e-business practices that gives rise to the need for reengineering their underlying software syst...
Mohammad El-Ramly, Eleni Stroulia, Paul G. Sorenso...
62
Voted
BMCBI
2007
88views more  BMCBI 2007»
14 years 10 months ago
Use of DNA melting simulation software for in silico diagnostic assay design: targeting regions with complex melting curves and
Background: DNA melting curve analysis using double-stranded DNA-specific dyes such as SYTO9 produce complex and reproducible melting profiles, resulting in the detection of multi...
John P. Rasmussen, Christopher P. Saint, Paul T. M...
82
Voted
AIPR
2003
IEEE
15 years 3 months ago
Quick Response Airborne Deployment of Viper Muzzle Flash Detection and Location System During DC Sniper Attacks
The VIPER infrared muzzle flash detection system was deployed from a helicopter and an airship in response to the Washington, DC area sniper attacks in October 2002. The system co...
M. Pauli, M. C. Ertem, E. Heidhausen