Sciweavers

2487 search results - page 189 / 498
» cases 2009
Sort
View
101
Voted
ER
2009
Springer
130views Database» more  ER 2009»
15 years 7 months ago
Designing Law-Compliant Software Requirements
New laws, such as HIPAA and SOX, are increasingly impacting the design of software systems, as business organisations strive to comply. This paper studies the problem of generating...
Alberto Siena, John Mylopoulos, Anna Perini, Angel...
ERCIMDL
2009
Springer
95views Education» more  ERCIMDL 2009»
15 years 7 months ago
Significance Is in the Eye of the Stakeholder
Custodians of digital content take action when the material that they are responsible for is threatened by, for example, obsolescence or deterioration. At first glance, ideal prese...
Angela Dappert, Adam Farquhar
ERSHOV
2009
Springer
15 years 7 months ago
Simulation of Kohn's Molecular Interaction Maps through Translation into Stochastic CLS+
Kohn’s Molecular Interaction Maps (MIMs) are a graphical notation for describing bioregulatory networks at the molecular level. Even if the meaning of Kohn’s diagrams can be of...
Roberto Barbuti, Daniela Lepri, Andrea Maggiolo-Sc...
102
Voted
ESA
2009
Springer
127views Algorithms» more  ESA 2009»
15 years 7 months ago
Maximum Flow in Directed Planar Graphs with Vertex Capacities
In this paper we present an O(n log n) algorithm for finding a maximum flow in a directed planar graph, where the vertices are subject to capacity constraints, in addition to the...
Haim Kaplan, Yahav Nussbaum
ESA
2009
Springer
346views Algorithms» more  ESA 2009»
15 years 7 months ago
Hash, Displace, and Compress
A hash function h, i.e., a function from the set U of all keys to the range range [m] = {0, . . . , m − 1} is called a perfect hash function (PHF) for a subset S ⊆ U of size n ...
Djamal Belazzougui, Fabiano C. Botelho, Martin Die...