Back to Results
First PageMeta Content
Science / Scientific modeling / Data / Data analysis / Data mining / Database / Systems engineering / Intrusion detection system / Relational database / Database management systems / Database theory / Data management


COMPUTER SCIENCE RESEARCH PROJECTS 2004 Career: Towards Estimating Requirement Coverage: Managing Goals and Scenarios During Requirements Evolution Annie I. Anton National Science Foundation
Add to Reading List

Document Date: 2013-12-09 11:41:13


Open Document

File Size: 163,28 KB

Share Result on Facebook

City

Venice / /

Company

Georgia Tech Research Corporation / Stepping Stones / Tracing Attacks Through Non-Cooperative Networks / Rada / Wavelength Routed Networks / /

Country

Italy / Dominican Republic / Belize / /

Currency

USD / /

Facility

Compliance Annie I. Anton University of Florida / Georgia Institute of Technology / Building Cost-Sensitive / Columbia University / NC State University / Florida Institute of Technology / IT Requirements Annie I. Anton Georgia Institute of Technology / /

IndustryTerm

area networks / good grooming solutions / scientific applications / real-time scheduling / ray-tracing algorithm / embedded systems / privacy enforcement tools / software engineers / Internet web site / hypothetical simple processor / intrusion detection systems / self-organizing database systems / ad-hoc networks / interactive intrusion detection algorithms / real-time surface solar radiation measurements / soft real-time scheduling / Internet Injong Rhee National Science Foundation / optical networking research / Internet measurements / software requirements / paint / software lifecycle / model-checking algorithms / online purchase / Wireless Networks / software systems / optical technology / relational data-management systems / real-time constraints / unsafe complex processor / visualization systems / contemporary processors / unsafe processors / cost-sensitive machine learning algorithms / bank / research / large-scale business applications / control systems / Plan recognition algorithms / industry/military applications / flow control protocols / concurrent systems / intermediate routers / conceptual tools / Internet technologies / computing / software solutions / real-time streaming applications / industrial and inter-institutional networking research collaborations / real-time systems / /

Organization

Columbia University / National Science Foundation / Transnational Digital Government / NC State University / Intrusion Identification and Secure Compartment Douglas Reeves Defense Advanced Research Projects Agency / Peng Ning US Department of Interior / Times Using Flexible Views Rada Chirkova Faculty Research and Professional Development Fund / United States Army / Georgia Institute of Technology / Florida Institute of Technology / Probablistic Systems S. Purushothaman Iyer US Army Research Office / University of Florida / Professional Development Fund / Environmental Protection Agency / /

Person

James Lester / Eric Rotenberg / Robert Funderlic / Harry Perros / Douglas Reeves / Julia Earp / Christopher G. Healey / George Rouskas / Patrick Fitzgerald / Annie I. Anton / Lynda Aiman-Smith / David Baumer Subcontractors / Frank Mueller / Robert St. Amant / Colin Potts / Christopher Healey / R. Michael Young / /

Position

interaction manager / perceptual visualization assistant / /

ProvinceOrState

Florida / /

PublishedMedium

SPARTA / /

TVStation

WCET / /

Technology

model-checking algorithms / Plan recognition algorithms / radiation / machine learning algorithms / relational database / Peer-to-Peer / Internet technologies / flow control protocols / P2P / developed protocols / shared memory / optical networking / artificial intelligence / Flow Control / interactive intrusion detection algorithms / Data Mining / cell phones / simulation / ray-tracing algorithm / /

SocialTag