Sciweavers

6978 search results - page 206 / 1396
» Reframing Requirements Analysis
Sort
View
ITRUST
2004
Springer
15 years 10 months ago
The Use of Formal Methods in the Analysis of Trust (Position Paper)
Security and trust are two properties of modern computing systems that are the focus of much recent interest. They play an increasingly significant role in the requirements for mo...
Michael J. Butler, Michael Leuschel, Stépha...
RSCTC
2004
Springer
150views Fuzzy Logic» more  RSCTC 2004»
15 years 10 months ago
Extracting Protein-Protein Interaction Sentences by Applying Rough Set Data Analysis
illion abstracts. Problem. How to find sentences that talk about protein-protein interactions? Example (Non-Interaction Sentence) All our data are consistent with models in which ...
Filip Ginter, Tapio Pahikkala, Sampo Pyysalo, Jorm...
141
Voted
SEM
2004
Springer
15 years 10 months ago
Accuracy of Performance Prediction for EJB Applications: A Statistical Analysis
Abstract. A challenging software engineering problem is the design and implementation of component-based (CB) applications that can meet specified performance requirements. Our PPC...
Yan Liu, Ian Gorton
ANSS
2003
IEEE
15 years 10 months ago
Performance Analysis of Parallel Job Scheduling in Distributed Systems
This paper studies parallel job scheduling in a distributed system. A simulation model is used to address performance issues associated with scheduling. Five policies are used to ...
Helen D. Karatza, Ralph C. Hilzer Jr.
ICDM
2003
IEEE
114views Data Mining» more  ICDM 2003»
15 years 10 months ago
Unsupervised Link Discovery in Multi-relational Data via Rarity Analysis
A significant portion of knowledge discovery and data mining research focuses on finding patterns of interest in data. Once a pattern is found, it can be used to recognize satisfy...
Shou-de Lin, Hans Chalupsky