Sciweavers

3193 search results - page 602 / 639
» A Security Risk Analysis Model for Information Systems
Sort
View
TAPIA
2009
ACM
14 years 10 days ago
Research experiences for undergraduates: autonomic computing research at FIU
According to Computing Research Association, during each year between 2003 and 2007, fewer than 3% of the US’s Ph.D.s graduates in computer science and computer engineering were...
Masoud Milani, Seyed Masoud Sadjadi, Raju Rangaswa...
IANDC
2006
77views more  IANDC 2006»
13 years 7 months ago
Lower and upper bounds on obtaining history independence
Abstract. History independent data structures, presented by Micciancio, are data structures that possess a strong security property: even if an intruder manages to get a copy of th...
Niv Buchbinder, Erez Petrank
ISN
1999
Springer
159views Communications» more  ISN 1999»
13 years 12 months ago
Accounting Management in a TINA-Based Service and Network Environment
The ACTS FlowThru project aims to build a management system which supports the flow of management information across organisational and technological domains by reusing components ...
Patrick Hellemans, Cliff Redmond, Koen Daenen, Dav...
BMCBI
2008
163views more  BMCBI 2008»
13 years 7 months ago
Nuclear staining and relative distance for quantifying epidermal differentiation in biomarker expression profiling
Background: The epidermal physiology results from a complex regulated homeostasis of keratinocyte proliferation, differentiation and death and is tightly regulated by a specific p...
Thora Pommerencke, Thorsten Steinberg, Hartmut Dic...
SIGIR
2003
ACM
14 years 28 days ago
Evaluating different methods of estimating retrieval quality for resource selection
In a federated digital library system, it is too expensive to query every accessible library. Resource selection is the task to decide to which libraries a query should be routed....
Henrik Nottelmann, Norbert Fuhr