Sciweavers

3686 search results - page 722 / 738
» An Approach to a Trustworthy System Architecture Using Virtu...
Sort
View
DIALM
2007
ACM
144views Algorithms» more  DIALM 2007»
13 years 11 months ago
Reliable Local Broadcast in a Wireless Network Prone to Byzantine Failures
Reliable broadcast can be a very useful primitive for many distributed applications, especially in the context of sensoractuator networks. Recently, the issue of reliable broadcas...
Vartika Bhandari, Nitin H. Vaidya
DASFAA
2009
IEEE
193views Database» more  DASFAA 2009»
13 years 11 months ago
Encryption over Semi-trusted Database
—Database security has become a vital issue in modern Web applications. Critical business data in databases is an evident target for attack. Therefore, ensuring the confidentiali...
Hasan Kadhem, Toshiyuki Amagasa, Hiroyuki Kitagawa
DEBS
2007
ACM
13 years 9 months ago
Identification of suspicious, unknown event patterns in an event cloud
This paper describes an approach to detect unknown event patterns. In this context, an event is not only something that happens, but also something that can be analysed. This task...
Alexander Widder, Rainer von Ammon, Philippe Schae...
ESWS
2008
Springer
13 years 9 months ago
An Ontology for Software Models and Its Practical Implications for Semantic Web Reasoning
Ontology-Driven Software Development (ODSD) advocates using ontologies for capturing knowledge about a software system at development time. So far, ODSD approaches have mainly focu...
Matthias Bräuer, Henrik Lochmann
DGO
2007
174views Education» more  DGO 2007»
13 years 9 months ago
New techniques for ensuring the long term integrity of digital archives
A large portion of the government, business, cultural, and scientific digital data being created today needs to be archived and preserved for future use of periods ranging from a ...
Sangchul Song, Joseph JáJá