Sciweavers

1846 search results - page 295 / 370
» A Framework for Integrating Business Processes and Business ...
Sort
View
ISI
2005
Springer
14 years 2 months ago
Collecting and Analyzing the Presence of Terrorists on the Web: A Case Study of Jihad Websites
Abstract. The Internet which has enabled global businesses to flourish has become the very same channel for mushrooming ‘terrorist news networks.’ Terrorist organizations and t...
Edna Reid, Jialun Qin, Yilu Zhou, Guanpi Lai, Marc...
VLDB
2004
ACM
105views Database» more  VLDB 2004»
14 years 2 months ago
Tamper Detection in Audit Logs
Audit logs are considered good practice for business systems, and are required by federal regulations for secure systems, drug approval data, medical information disclosure, fina...
Richard T. Snodgrass, Shilong (Stanley) Yao, Chris...
DFT
2003
IEEE
142views VLSI» more  DFT 2003»
14 years 2 months ago
Exploiting Instruction Redundancy for Transient Fault Tolerance
This paper presents an approach for integrating fault-tolerance techniques into microprocessors by utilizing instruction redundancy as well as time redundancy. Smaller and smaller...
Toshinori Sato
HICSS
2003
IEEE
103views Biometrics» more  HICSS 2003»
14 years 2 months ago
Toward More Robust Infrastructure: Observations on Improving the Resilience and Reliability of Critical Systems
Civil infrastructure provides the range of essential services generally necessary to support a nation’s economy and quality of life—arguably entire economies rely on the abili...
Richard G. Little
ER
2003
Springer
150views Database» more  ER 2003»
14 years 2 months ago
EITH - A Unifying Representation for Database Schema and Application Code in Enterprise Knowledge Extraction
The integration of heterogeneous legacy databases requires understanding of database structure and content. We previously developed a theoretical and software infrastructure to sup...
Mark S. Schmalz, Joachim Hammer, Mingxi Wu, Oguzha...