Sciweavers

10666 search results - page 1798 / 2134
» Quantum programming languages
Sort
View
IFIP
2007
Springer
15 years 11 months ago
Lessons Learned from the Maroochy Water Breach
Supervisory control and data acquisition (SCADA) systems are widely used to monitor and control operations in electrical power distribution facilities, oil and gas pipelines, water...
Jill Slay, Michael Miller
IFIP
2007
Springer
15 years 11 months ago
Insider Threat Analysis Using Information-Centric Modeling
Capability acquisition graphs (CAGs) provide a powerful framework for modeling insider threats, network attacks and system vulnerabilities. However, CAG-based security modeling sys...
Duc T. Ha, Shambhu J. Upadhyaya, Hung Q. Ngo, S. P...
IFIP
2007
Springer
15 years 11 months ago
Super-Resolution Video Analysis for Forensic Investigations
Super-resolution algorithms typically improve the resolution of a video frame by mapping and performing signal processing operations on data from frames immediately preceding and i...
Ashish Gehani, John H. Reif
IFIP
2007
Springer
15 years 11 months ago
A Case Study on the Impact of Refactoring on Quality and Productivity in an Agile Team
Refactoring is a hot and controversial issue. Supporters claim that it helps increasing the quality of the code, making it easier to understand, modify and maintain. Moreover, the...
Raimund Moser, Pekka Abrahamsson, Witold Pedrycz, ...
IFIP
2007
Springer
15 years 11 months ago
A Framework for QoS Contract Negotiation in Component-Based Applications
The support of QoS properties in component-based software requires the run-time selection of appropriate concrete QoS contracts at the ports of the interacting components. Such a s...
Mesfin Mulugeta, Alexander Schill
« Prev « First page 1798 / 2134 Last » Next »