Sciweavers

365 search results - page 71 / 73
» A Model-Driven Approach to Designing Cross-Enterprise Busine...
Sort
View
DEBS
2007
ACM
13 years 11 months ago
Identification of suspicious, unknown event patterns in an event cloud
This paper describes an approach to detect unknown event patterns. In this context, an event is not only something that happens, but also something that can be analysed. This task...
Alexander Widder, Rainer von Ammon, Philippe Schae...
SP
2007
IEEE
108views Security Privacy» more  SP 2007»
14 years 4 months ago
Trojan Detection using IC Fingerprinting
Hardware manufacturers are increasingly outsourcing their IC fabrication work overseas due to much lower costs. This poses a significant security risk for ICs used for critical m...
Dakshi Agrawal, Selçuk Baktir, Deniz Karako...
MODELS
2009
Springer
14 years 4 months ago
Product derivation for solution-driven product line engineering
Solution-driven product line engineering is a project business where products are created for each customer individually. Although reuse of results from former projects is widely ...
Christoph Elsner, Daniel Lohmann, Wolfgang Schr&ou...
WWW
2005
ACM
14 years 10 months ago
Ensuring required failure atomicity of composite Web services
The recent evolution of Internet, driven by the Web services technology, is extending the role of the Web from a support of information interaction to a middleware for B2B interac...
Sami Bhiri, Olivier Perrin, Claude Godart
SIGSOFT
2009
ACM
14 years 4 months ago
Automatic synthesis of behavior protocols for composable web-services
Web-services are broadly considered as an effective means to achieve interoperability between heterogeneous parties of a business process and offer an open platform for developing...
Antonia Bertolino, Paola Inverardi, Patrizio Pelli...