Sciweavers

64 search results - page 4 / 13
» An Extensible Framework for Database Security Assessment and...
Sort
View
SEKE
2007
Springer
14 years 1 months ago
A Model-driven Approach to Architecting Secure Software
A software architecture provides a high-level description of a software solution in terms of the structure, topology, and interactions between its principal components. While a nu...
Ebenezer A. Oladimeji, Sam Supakkul, Lawrence Chun...
BMCBI
2010
178views more  BMCBI 2010»
13 years 7 months ago
CNV Workshop: an integrated platform for high-throughput copy number variation discovery and clinical diagnostics
Background: Recent studies have shown that copy number variations (CNVs) are frequent in higher eukaryotes and associated with a substantial portion of inherited and acquired risk...
Xiaowu Gai, Juan C. Perin, Kevin Murphy, Ryan O'Ha...
IFIP
2001
Springer
14 years 1 days ago
Security Documentation
Effective security management depends upon good risk management, which is itself based upon a reliable risk assessment, involving data collection of all the facets influencing sys...
Lam-for Kwok, Peggy P. K. Fung, Dennis Longley
ENVSOFT
2007
109views more  ENVSOFT 2007»
13 years 7 months ago
The Automated Geospatial Watershed Assessment tool
A toolkit for distributed hydrologic modeling at multiple scales using two independent models within a geographic information system is presented. This open-source, freely availab...
Scott N. Miller, Darius J. Semmens, David C. Goodr...
ICDE
2006
IEEE
147views Database» more  ICDE 2006»
14 years 9 months ago
VBI-Tree: A Peer-to-Peer Framework for Supporting Multi-Dimensional Indexing Schemes
Multi-dimensional data indexing has received much attention in a centralized database. However, not so much work has been done on this topic in the context of Peerto-Peer systems....
H. V. Jagadish, Beng Chin Ooi, Quang Hieu Vu, Rong...