Sciweavers

308 search results - page 40 / 62
» An Agile Approach to a Legacy System
Sort
View
EUROSYS
2006
ACM
14 years 4 months ago
Reducing TCB complexity for security-sensitive applications: three case studies
The large size and high complexity of securitysensitive applications and systems software is a primary cause for their poor testability and high vulnerability. One approach to all...
Lenin Singaravelu, Calton Pu, Hermann Härtig,...
JOT
2008
445views more  JOT 2008»
13 years 7 months ago
From The Business Motivation Model (BMM) To Service Oriented Architecture (SOA)
The purpose of this article is to provide a brief insight about how to link your business vision, goals, strategies, tactics as well as business rules according to BMM, then bridg...
Birol Berkem
ICIP
2009
IEEE
14 years 8 months ago
Ppiq: A Probabilistic Framework For Image Quality Assessment
In this paper a framework for Image Quality Assessment (IQA) is introduced based on the properties of Receptive Fields (RFs) which are the primary mechanism for detection of visua...
NCA
2009
IEEE
14 years 2 months ago
Sharing Private Information Across Distributed Databases
—In industries such as healthcare, there is a need to electronically share privacy-sensitive data across distinct organizations. We show how this can be done while allowing organ...
Michael Siegenthaler, Ken Birman
TES
2005
Springer
14 years 26 days ago
A Lightweight Model-Driven Orchestration Engine for e-Services
Service-oriented Computing (SoC) in general, and e-service orchestrations in particular have the potential to increase reuse and to ease maintainability. Typically, interoperating ...
Johann Oberleitner, Florian Rosenberg, Schahram Du...