Sciweavers

3193 search results - page 570 / 639
» A Security Risk Analysis Model for Information Systems
Sort
View
QSIC
2005
IEEE
14 years 2 months ago
Proving the Safety of SQL Queries
Many programs need to access data in a relational database. This is usually done by means of queries written in SQL. Although the language SQL is declarative, certain runtime erro...
Stefan Brass, Christian Goldberg
CAISE
2005
Springer
14 years 2 months ago
Service-Oriented Architectures and Mobile Services
Service-Oriented architectures and Service-Oriented Computing are the most recent approaches aiming at facilitating the design and development of applications on distributed system...
Ivar Jørstad, Schahram Dustdar, Do Van Than...
METRICS
1999
IEEE
14 years 1 months ago
Function Point Measurement Tool for UML Design Specification
Function point analysis(FPA) was proposedto help measure the size of a computerizedbusiness information system. It is widely used in the actual software development. However, it h...
Takuya Uemura, Shinji Kusumoto, Katsuro Inoue
COSIT
1997
Springer
102views GIS» more  COSIT 1997»
14 years 1 months ago
Partition and Conquer
Abstract. Although maps and partitions are ubiquitous in geographical information systems and spatial databases, there is only little work investigating their foundations. We give ...
Martin Erwig, Markus Schneider
ENTCS
2006
146views more  ENTCS 2006»
13 years 9 months ago
Formalizing WSBPEL Business Processes Using Process Algebra
Industry standards for Web Service composition, such as WSBPEL, provide the notation and additional control mechanisms for the execution of business processes in Web Service colla...
Javier Cámara, Carlos Canal, Javier Cubo, A...