Sciweavers

1425 search results - page 195 / 285
» The combined ISAC-ER methodology of information systems deve...
Sort
View
CAISE
2007
Springer
15 years 4 months ago
A Context-based Approach for Complex Semantic Matching
Semantic matching1 is a fundamental step in implementing data sharing applications. Most systems automating this task however limit themselves to finding simple (one-to-one) match...
Youssef Bououlid Idrissi, Julie Vachon
HICSS
2005
IEEE
148views Biometrics» more  HICSS 2005»
15 years 3 months ago
Public-Key-Infrastructure Based on a Peer-to-Peer Network
The goal of a Public-Key-Infrastructure (PKI) is to prove whether a cryptographic public key is authentic for a certain user. This information is crucial for the reliability of as...
Thomas Wölfl
ISSTA
2000
ACM
15 years 2 months ago
OMEN: A strategy for testing object-oriented software
This paper presents a strategy for structural testing of objectoriented software systems with possibly unknown clients and unknown information about invoked methods. By exploiting...
Amie L. Souter, Lori L. Pollock
EXACT
2008
15 years 6 days ago
A Temporal Abductive Diagnostic Process for Runtime Properties Violations
The monitoring of properties of complex software systems can provide the core functionality for detecting violations of such properties. However, the violations detection cannot be...
Theocharis Tsigkritis, George Spanoudakis
ISPASS
2008
IEEE
15 years 4 months ago
Independent Component Analysis and Evolutionary Algorithms for Building Representative Benchmark Subsets
— This work addresses the problem of building representative subsets of benchmarks from an original large set of benchmarks, using statistical analysis techniques. The subsets sh...
Vassilios N. Christopoulos, David J. Lilja, Paul R...