Sciweavers

134 search results - page 18 / 27
» Detecting Clones in Business Applications
Sort
View
BPM
2006
Springer
78views Business» more  BPM 2006»
14 years 1 months ago
Semantic Correctness in Adaptive Process Management Systems
Adaptivity in Process Management Systems (PMS) is key to their successful applicability in pratice. Approaches have already been developed to ensure the system correctness after ar...
Linh Thao Ly, Stefanie Rinderle, Peter Dadam
GI
2007
Springer
14 years 4 months ago
Achieving Semantic Interoperability By Using Complex Event Processing Technology
: State-of-the-art interoperability between heterogeneous systems on a technical level builds on services oriented architectures (SOA) for a given problem space. Semantics can be i...
Margarete Donovang-Kuhlisch
PVLDB
2008
99views more  PVLDB 2008»
13 years 9 months ago
Industry-scale duplicate detection
Duplicate detection is the process of identifying multiple representations of a same real-world object in a data source. Duplicate detection is a problem of critical importance in...
Melanie Weis, Felix Naumann, Ulrich Jehle, Jens Lu...
SP
2007
IEEE
108views Security Privacy» more  SP 2007»
14 years 4 months ago
Trojan Detection using IC Fingerprinting
Hardware manufacturers are increasingly outsourcing their IC fabrication work overseas due to much lower costs. This poses a significant security risk for ICs used for critical m...
Dakshi Agrawal, Selçuk Baktir, Deniz Karako...
NSDI
2010
13 years 11 months ago
Glasnost: Enabling End Users to Detect Traffic Differentiation
Holding residential ISPs to their contractual or legal obligations of "unlimited service" or "network neutrality" is hard because their traffic management poli...
Marcel Dischinger, Massimiliano Marcon, Saikat Guh...