Sciweavers

151 search results - page 10 / 31
» Determining source contribution in integration systems
Sort
View
AUSFORENSICS
2003
13 years 8 months ago
Design of a Network-Access Audit Log for Security Monitoring and Forensic Investigation
An attempt at determining the source of anomalous network traffic may result in the identification of the networked system where it originated. From a forensic point of view it is...
Atif Ahmad, Tobias Ruighaver
CAISE
2003
Springer
14 years 21 days ago
Designing a Federated Multimedia Information System on the Semantic Web
A federated Web-based multimedia information system on one hand gathers its data from various Web sources, on the other hand offers the end-user a rich semantics describing its co...
Richard Vdovjak, Peter Barna, Geert-Jan Houben
WCRE
2007
IEEE
14 years 1 months ago
Discovering the Objectual Meaning of Foreign Key Constraints in Enterprise Applications
The software industry is increasingly confronted with the issues of understanding and maintaining a special type of object-oriented systems, namely enterprise applications. A spec...
Cristina Marinescu
AICT
2006
IEEE
162views Communications» more  AICT 2006»
14 years 1 months ago
A Bayesian framework for online reputation systems
— As the number of online auction sites has increased, interest towards providing reliable summaries, reputations, about the past behaviour of sellers has risen. Existing approac...
Petteri Nurmi
ICDE
2005
IEEE
126views Database» more  ICDE 2005»
14 years 8 months ago
A Probabilistic XML Approach to Data Integration
In mobile and ambient environments, devices need to become autonomous, managing and resolving problems without interference from a user. The database of a (mobile) device can be s...
Maurice van Keulen, Ander de Keijzer, Wouter Alink