Sciweavers

3555 search results - page 568 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
ESWA
2006
243views more  ESWA 2006»
15 years 3 months ago
Knowledge based crime scenario modelling
A crucial concern in the evaluation of evidence related to a major crime is the formulation of sufficient alternative plausible scenarios that can explain the available evidence. ...
Jeroen Keppens, Burkhard Schafer
WWW
2006
ACM
16 years 4 months ago
Bringing communities to the semantic web and the semantic web to communities
In this paper we consider the types of community networks that are most often codified within the Semantic Web. We propose the recognition of a new structure which fulfils the def...
K. Faith Lawrence, Monica M. C. Schraefel
GECCO
2007
Springer
183views Optimization» more  GECCO 2007»
15 years 10 months ago
Search-based testing of service level agreements
The diffusion of service oriented architectures introduces the need for novel testing approaches. On the one side, testing must be able to identify failures in the functionality ...
Massimiliano Di Penta, Gerardo Canfora, Gianpiero ...
IWANN
2009
Springer
15 years 10 months ago
Identifying Gene Ontology Areas for Automated Enrichment
Biomedical ontologies provide a commonly accepted scheme for the characterization of biological concepts that enable knowledge sharing and integration. Updating and maintaining an ...
Catia Pesquita, Tiago Grego, Francisco M. Couto
IFIP
2007
Springer
15 years 10 months ago
Capable Leader and Skilled and Motivated Team Practices to Introduce eXtreme Programming
Abstract. Applying changes to software engineering processes in organisations usually raises many problems of varying nature. Basing on a real-world 2-year project and a simultaneo...
Lech Madeyski, Wojciech Biela