Sciweavers

826 search results - page 129 / 166
» Software Reuse: Research and Practice
Sort
View
100
Voted
WSC
2000
15 years 1 months ago
Dynamic component substitution in web-based simulation
Recent breakthroughs in communication and software engineering has resulted in significant growth of web-based computing. Web-based techniques have been employed for modeling, sim...
Dhananjai Madhava Rao, Philip A. Wilsey
102
Voted
IEEEARES
2009
IEEE
15 years 7 months ago
Routing Protocol Security Using Symmetric Key Based Techniques
—In this paper, we address the security of routing protocols. Internet routing protocols are subject to attacks in the control plane as well as the data plane. In the control pla...
Bezawada Bruhadeshwar, Kishore Kothapalli, M. Poor...
105
Voted
APN
2005
Springer
15 years 6 months ago
The ProM Framework: A New Era in Process Mining Tool Support
Under the umbrella of buzzwords such as “Business Activity Monitoring” (BAM) and “Business Process Intelligence” (BPI) both academic (e.g., EMiT, Little Thumb, InWoLvE, Pro...
Boudewijn F. van Dongen, Ana Karla A. de Medeiros,...
90
Voted
CHI
2007
ACM
16 years 28 days ago
Design and evaluation of 3d models for electronic dental records
We present the results of a field study of some of the work practices and software used by dentists. We also present the design, implementation, and evaluation of a user interface...
Michael F. Marotta, Purin Phanichphant, Patrick Ma...
95
Voted
DISCEX
2003
IEEE
15 years 5 months ago
Achieving Principled Assuredly Trustworthy Composable Systems and Networks
Huge challenges exist with systems and networks that must dependably satisfy stringent requirements for security, reliability, and other attributes of trustworthiness. Drawing on ...
Peter G. Neumann