Sciweavers

2513 search results - page 114 / 503
» Tamper-Tolerant Software: Modeling and Implementation
Sort
View
CBSE
2008
Springer
14 years 12 months ago
Automating Performance Analysis from Taverna Workflows
Abstract. Workflow systems provide support for combining components to achieve a particular outcome. Various approaches from software engineering have been utilized within such sys...
Rafael Tolosana-Calasanz, Omer F. Rana, José...
RE
2008
Springer
14 years 9 months ago
Requirements Capture with RCAT
NASA spends millions designing and building spacecraft for its missions. The dependence on software is growing as spacecraft become more complex. With the increasing dependence on...
Margaret H. Smith, Klaus Havelund
POPL
2008
ACM
15 years 10 months ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk
BIBM
2007
IEEE
132views Bioinformatics» more  BIBM 2007»
15 years 4 months ago
A Divide-and-Conquer Implementation of Three Sequence Alignment and Ancestor Inference
In this paper, we present an algorithm to simultaneously align three biological sequences with affine gap model and infer their common ancestral sequence. Our algorithm can be fu...
Feng Yue, Jijun Tang
ICEBE
2006
IEEE
91views Business» more  ICEBE 2006»
15 years 4 months ago
SOA-Driven Business-Software Alignment
The alignment of business processes and their supporting application software is a major concern during the initial software design phases. This paper proposes a design approach a...
Boris Shishkov, Marten van Sinderen, Dick A. C. Qu...