Sciweavers

31686 search results - page 6191 / 6338
» Resource typing in Guru
Sort
View
CG
2007
Springer
15 years 25 days ago
Visual data mining and analysis of software repositories
In this article we describe an ongoing effort to integrate information visualization techniques into the process of configuration management for software systems. Our focus is to...
Lucian Voinea, Alexandru Telea
84
Voted
IEEESP
2006
108views more  IEEESP 2006»
15 years 25 days ago
Defining Misuse within the Development Process
abstraction a use case model offers makes it an appropriate startingpointforsoftwaresecurityanalysis and design activities. In contrast, a misuse case describes potential system be...
Gunnar Peterson, John Steven
80
Voted
CMPB
2007
113views more  CMPB 2007»
15 years 25 days ago
Paternity analysis in Excel
Paternity analysis using microsatellite information is a well studied subject. These markers are ideal for parentage studies and fingerprinting, due to their high discrimination ...
Margarida Rocheta, F. Miguel Dionísio, Lu&i...
122
Voted
CN
2007
129views more  CN 2007»
15 years 24 days ago
Performance evaluation of MAC transmission power control in wireless sensor networks
In this paper we provide a method to analytically compute the energy saving provided by the use of transmission power control (TPC) at the MAC layer in wireless sensor networks (W...
Javier Vales-Alonso, Esteban Egea-López, Al...
CN
2007
114views more  CN 2007»
15 years 24 days ago
BiSNET: A biologically-inspired middleware architecture for self-managing wireless sensor networks
This paper describes BiSNET (Biologically-inspired architecture for Sensor NETworks), a middleware architecture that addresses several key issues in multi-modal wireless sensor ne...
Pruet Boonma, Junichi Suzuki
« Prev « First page 6191 / 6338 Last » Next »