Sciweavers

3555 search results - page 627 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
SSDBM
2008
IEEE
149views Database» more  SSDBM 2008»
15 years 7 months ago
Query Planning for Searching Inter-dependent Deep-Web Databases
Increasingly, many data sources appear as online databases, hidden behind query forms, thus forming what is referred to as the deep web. It is desirable to have systems that can pr...
Fan Wang, Gagan Agrawal, Ruoming Jin
DESRIST
2009
Springer
79views Education» more  DESRIST 2009»
15 years 6 months ago
Power of peripheral designers: how users learn to design
In information system development, end-users often participate in design and in many cases learn to design their own system. Design, however, requires a distinct approach that use...
Yutaka Yamauchi
BMCBI
2006
98views more  BMCBI 2006»
15 years 1 months ago
Optimised amino acid specific weighting factors for unbound protein docking
Background: One of the most challenging aspects of protein-protein docking is the inclusion of flexibility into the docking procedure. We developed a postfilter where the grid-rep...
Philipp Heuser, Dietmar Schomburg
SAC
2009
ACM
15 years 8 months ago
Static type inference for Ruby
Many general-purpose, object-oriented scripting languages are dynamically typed, to keep the language flexible and not reject any programs unnecessarily. However, dynamic typing ...
Michael Furr, Jong-hoon (David) An, Jeffrey S. Fos...
ECBS
2007
IEEE
155views Hardware» more  ECBS 2007»
15 years 5 months ago
Evaluating the Quality of Models Extracted from Embedded Real-Time Software
Due to the high cost of modeling, model-based techniques are yet to make their impact in the embedded systems industry, which still persist on maintaining code-oriented legacy sys...
Joel Huselius, Johan Kraft, Hans Hansson, Sasikuma...