Sciweavers

4917 search results - page 460 / 984
» Software Engineering is Not Computer Science
Sort
View
ECSA
2010
Springer
15 years 5 months ago
Formal approach to security metrics.: what does "more secure" mean for you?
Security metrics are the tools for providing correct and upto-date information about a state of security. This information is essential for managing security efficiently. Although...
Leanid Krautsevich, Fabio Martinelli, Artsiom Yaut...
165
Voted
SAC
2006
ACM
15 years 4 months ago
Transforming OCL constraints: a context change approach
Integrity constraints (ICs) play a key role in the definition of conceptual schemas. In the UML, ICs are usually specified as invariants written in the OCL. However, due to the hi...
Jordi Cabot, Ernest Teniente
TCS
2011
14 years 11 months ago
Highly concurrent multi-word synchronization
d Abstract) Hagit Attiya and Eshcar Hillel Department of Computer Science, Technion The design of concurrent data structures is greatly facilitated by the availability of synchroni...
Hagit Attiya, Eshcar Hillel
CSE
2009
IEEE
15 years 11 months ago
Improving Interobserver Reliability by Artificial Intelligence Techniques in Behavioural Research
Interobserver reliability and reproducibility are well known problems in experimental research within the social and behavioural sciences. We propose the use of formal techniques ...
Arjen van Alphen, Tibor Bosse, Catholijn M. Jonker...
CAD
2006
Springer
15 years 4 months ago
Region-expansion for the Voronoi diagram of 3D spheres
Given a set of spheres in 3D, constructing its Voronoi diagram in Euclidean distance metric is not easy at all even though many mathematical properties of its structure are known....
Donguk Kim, Deok-Soo Kim