Sciweavers

419 search results - page 61 / 84
» An Automated Approach for Identifying Potential Vulnerabilit...
Sort
View
ICEGOV
2007
ACM
13 years 11 months ago
Formal threat descriptions for enhancing governmental risk assessment
Compared to the last decades, we have recently seen more and more governmental applications which are provided via the Internet directly to the citizens. Due to the long history o...
Andreas Ekelhart, Stefan Fenz, Thomas Neubauer, Ed...
ICDE
2010
IEEE
206views Database» more  ICDE 2010»
13 years 9 months ago
HECATAEUS: Regulating Schema Evolution
HECATAEUS is an open-source software tool for enabling impact prediction, what-if analysis, and regulation of relational database schema evolution. We follow a graph theoretic appr...
George Papastefanatos, Panos Vassiliadis, Alkis Si...
ESWS
2007
Springer
14 years 1 months ago
Scalable Web Service Composition with Partial Matches
We investigate scalable algorithms for automated composition (WSC) of Semantic Web Services. Our notion of WSC is very general: the composition semantics includes background knowl...
Adina Sirbu, Jörg Hoffmann
CORR
2010
Springer
67views Education» more  CORR 2010»
13 years 7 months ago
Life-Cycles and Mutual Effects of Scientific Communities
Community effects on the behaviour of individuals, the community itself and other communities can be observed in a wide range of applications. This is true in scientific research,...
Václav Belák, Marcel Karnstedt, Cono...
ERSA
2006
111views Hardware» more  ERSA 2006»
13 years 9 months ago
Promises and Pitfalls of Reconfigurable Supercomputing
Reconfigurable supercomputing (RSC) combines programmable logic chips with high performance microprocessors, all communicating over a high bandwidth, low latency interconnection n...
Maya Gokhale, Christopher Rickett, Justin L. Tripp...