Sciweavers

15885 search results - page 2878 / 3177
» Strategic Software Engineering
Sort
View
DESRIST
2009
Springer
125views Education» more  DESRIST 2009»
15 years 9 months ago
An empirical evaluation of information security awareness levels in designing secure business processes
Information Systems Security (ISS) is critical to ensuring the integrity and credibility of digitally exchanged information in business processes. Information systems development ...
Fergle D'Aubeterre, Lakshmi S. Iyer, Rahul Singh
EURODAC
1994
IEEE
211views VHDL» more  EURODAC 1994»
15 years 8 months ago
Advanced simulation and modeling techniques for hardware quality verification of digital systems
synchronisation also play a fundamental role in overall system robustness. ElectroMagnetic Compatibility (EMC) and ElectroMagnetic Interference (EMI) issues also have to be conside...
S. Forno, Stephen Rochel
KDD
2010
ACM
240views Data Mining» more  KDD 2010»
15 years 8 months ago
Diagnosing memory leaks using graph mining on heap dumps
Memory leaks are caused by software programs that prevent the reclamation of memory that is no longer in use. They can cause significant slowdowns, exhaustion of available storag...
Evan K. Maxwell, Godmar Back, Naren Ramakrishnan
209
Voted
EDO
2006
Springer
15 years 8 months ago
An extensible, lightweight architecture for adaptive J2EE applications
Server applications with adaptive behaviors can adapt their functionality in response to environmental changes, and significantly reduce the on-going costs of system deployment an...
Ian Gorton, Yan Liu, Nihar Trivedi
DOLAP
2005
ACM
15 years 6 months ago
Applying MDA to the development of data warehouses
Different modeling approaches have been proposed to overcome every design pitfall of the development of the different parts of a data warehouse (DW) system. However, they are all ...
Jose-Norberto Mazón, Juan Trujillo, Manuel ...
« Prev « First page 2878 / 3177 Last » Next »