Sciweavers

1382 search results - page 189 / 277
» Strider: Configuration Modelling and Analysis of Complex Sys...
Sort
View
JCIT
2008
154views more  JCIT 2008»
14 years 10 months ago
A Multi-Agent Framework for Testing 3-Tier Distributed Systems Architecture
Lack of time and capital for software testing is an oft encountered problem in most organizations. The plethora of possible test cases for each software component makes software t...
Sunitha Ramanujam, Hany F. El Yamany, Miriam A. M....
IJMI
2007
134views more  IJMI 2007»
14 years 9 months ago
Investigating risk exposure in e-health systems
: The increasing dependency being placed on electronic health information systems presents new challenges for today’s health managers and systems developers. This paper uses Elec...
Peter R. Croll, Jasmine Croll
INFOSCALE
2006
ACM
15 years 3 months ago
PENS: an algorithm for density-based clustering in peer-to-peer systems
Huge amounts of data are available in large-scale networks of autonomous data sources dispersed over a wide area. Data mining is an essential technology for obtaining hidden and v...
Mei Li, Guanling Lee, Wang-Chien Lee, Anand Sivasu...
EDBT
2009
ACM
81views Database» more  EDBT 2009»
15 years 2 months ago
Exploiting similarity-aware grouping in decision support systems
Decision Support Systems (DSS) are information systems that support decision making processes. In many scenarios these systems are built on top of data managed by DBMSs and make e...
Yasin N. Silva, Muhammad U. Arshad, Walid G. Aref
AINA
2007
IEEE
15 years 4 months ago
Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems
Abstract— Structured peer-to-peer systems have grown enormously because of their scalability, efficiency and reliability. These systems assign a unique identifier to each user ...
Sunam Ryu, Kevin R. B. Butler, Patrick Traynor, Pa...