Sciweavers

134 search results - page 12 / 27
» Detecting Clones in Business Applications
Sort
View
INAP
2001
Springer
14 years 2 months ago
Content-based Management of Document Access Control
Three different security models have been advocated to determine the access rights to documents in a network of computers; DAC, MLS, and RBAC. Each of these models has its strengt...
Edgar Weippl, Ismail Khalil Ibrahim, Werner Winiwa...
DASFAA
2009
IEEE
152views Database» more  DASFAA 2009»
14 years 4 months ago
Predicting Timing Failures in Web Services
Abstract. Web services are increasingly being used in business critical environments, enabling uniform access to services provided by distinct parties. In these environments, an op...
Nuno Laranjeiro, Marco Vieira, Henrique Madeira
DIMVA
2006
13 years 11 months ago
Using Static Program Analysis to Aid Intrusion Detection
Abstract. The Internet, and in particular the world-wide web, have become part of the everyday life of millions of people. With the growth of the web, the demand for on-line servic...
Manuel Egele, Martin Szydlowski, Engin Kirda, Chri...
HICSS
2002
IEEE
90views Biometrics» more  HICSS 2002»
14 years 2 months ago
Knowledge-Based IS Implementation Support: An Application to the IS Change Agent Role Problem
The threat of abandoned or extensively overhauled IS is a major concern for both MIS specialists and businesses. This concern may stem from the mismatch between MIS specialist cha...
Meral Binbasioglu, Elaine Winston
NIPS
2001
13 years 11 months ago
Model Based Population Tracking and Automatic Detection of Distribution Changes
Probabilistic mixture models are used for a broad range of data analysis tasks such as clustering, classification, predictive modeling, etc. Due to their inherent probabilistic na...
Igor V. Cadez, Paul S. Bradley