Sciweavers

384 search results - page 32 / 77
» Elicitation of Information Needs in Precontract Requirements...
Sort
View
ICDE
2012
IEEE
251views Database» more  ICDE 2012»
11 years 10 months ago
Earlybird: Real-Time Search at Twitter
— The web today is increasingly characterized by social and real-time signals, which we believe represent two frontiers in information retrieval. In this paper, we present Earlyb...
Michael Busch, Krishna Gade, Brian Larson, Patrick...
ICSE
2009
IEEE-ACM
14 years 2 months ago
Integrating sustainability in decision-making processes: A modelling strategy
One of the most difficult problems that humanity currently faces is the sustainable development of our society, i.e. how to meet the needs of the present without compromising the...
Jordi Cabot, Steve M. Easterbrook, Jennifer Horkof...
COMPSAC
2010
IEEE
13 years 5 months ago
A Consistency Model for Identity Information in Distributed Systems
In distributed IT systems, replication of information is commonly used to strengthen the fault tolerance on a technical level or the autonomy of an organization on a business level...
Thorsten Höllrigl, Jochen Dinger, Hannes Hart...
CSE
2009
IEEE
14 years 2 months ago
A Hybrid Enforcement Model for Group-centric Secure Information Sharing
—Group-Centric Secure Information Sharing (g-SIS) is motivated by the need to dynamically share information amongst a set of authorized users for a specific purpose. Authorized ...
Ram Krishnan, Ravi S. Sandhu
IWPC
2006
IEEE
14 years 1 months ago
Understanding Obfuscated Code
Code obfuscation makes it harder for a security analyst to understand the malicious payload of a program. In most cases an analyst needs to study the program at the machine code l...
Matias Madou, Ludo Van Put, Koen De Bosschere