Sciweavers

402 search results - page 35 / 81
» Practical Application of Existing Hypermedia Standards and T...
Sort
View
COMPSAC
2009
IEEE
15 years 3 months ago
On a Classification Approach for SOA Vulnerabilities
Abstract--Vulnerabilities in operating systems and web applications have been and are being put into various classifications, leading to a better understanding of their causes and ...
Lutz Lowis, Rafael Accorsi
AIME
2011
Springer
13 years 11 months ago
The FMA in OWL 2
Representing the Foundational Model of Anatomy (FMA) in OWL 2 is essential for semantic interoperability. The paper describes the method and tool used to formalize the FMA in OWL 2...
Christine Golbreich, Julien Grosjean, Stéfa...
CSCWD
2006
Springer
15 years 3 months ago
Collaborative Multidisciplinary Design in Virtual Environments
The application designers can usually define their own "virtual environments" by selecting the appropriate computing resources required, or reuse and compose existing en...
Toan Nguyen, Vittorio Selmin
ACSD
2006
IEEE
105views Hardware» more  ACSD 2006»
15 years 5 months ago
Throughput Analysis of Synchronous Data Flow Graphs
Synchronous Data Flow Graphs (SDFGs) are a useful tool for modeling and analyzing embedded data flow applications, both in a single processor and a multiprocessing context or for...
Amir Hossein Ghamarian, Marc Geilen, Sander Stuijk...
BMCBI
2006
92views more  BMCBI 2006»
14 years 11 months ago
Recrafting the neighbor-joining method
Background: The neighbor-joining method by Saitou and Nei is a widely used method for constructing phylogenetic trees. The formulation of the method gives rise to a canonical (n3)...
Thomas Mailund, Gerth Stølting Brodal, Rolf...