Sciweavers

7529 search results - page 1360 / 1506
» The Modula-3 Type System
Sort
View
NDSS
2008
IEEE
15 years 11 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...
HICSS
2007
IEEE
139views Biometrics» more  HICSS 2007»
15 years 11 months ago
Ontology Driven CPG Authoring and Execution via a Semantic Web Framework
Clinical Practice Guidelines (CPG) are used by healthcare practitioners to standardize clinical practice and to provide evidence mediated health-care. Currently, there have been c...
Sajjad Hussain, Syed Sibte Raza Abidi
ICNSC
2007
IEEE
15 years 11 months ago
Planning the Location of Intermodal Freight Hubs: an Agent Based Approach
—Intermodal freight transportation is defined as a system that carries freight from origin to destination by using two or more transportation modes. In this system, hubs are one ...
Koen H. van Dam, Zofia Verwater-Lukszo, Luis Ferre...
ICSEA
2007
IEEE
15 years 11 months ago
Test Data Generation from UML State Machine Diagrams using GAs
Automatic test data generation helps testers to validate software against user requirements more easily. Test data can be generated from many sources; for example, experience of t...
Chartchai Doungsa-ard, Keshav P. Dahal, M. Alamgir...
IEEESCC
2007
IEEE
15 years 11 months ago
Deriving executable BPEL from UMM Business Transactions
UN/CEFACT’s Modeling Methodology (UMM) is a UML profile for modeling global B2B choreographies. The basic building blocks of UMM are business transactions, which describe the e...
Birgit Hofreiter, Christian Huemer, Philipp Liegl,...
« Prev « First page 1360 / 1506 Last » Next »