Sciweavers

45 search results - page 7 / 9
» Enforcing a security pattern in stakeholder goal models
Sort
View
VLDB
2007
ACM
150views Database» more  VLDB 2007»
14 years 1 months ago
Monitoring Business Processes with Queries
Many enterprises nowadays use business processes, based on the BPEL standard, to achieve their goals. These are complex, often distributed, processes. Monitoring the execution of ...
Catriel Beeri, Anat Eyal, Tova Milo, Alon Pilberg
ICB
2009
Springer
184views Biometrics» more  ICB 2009»
14 years 2 months ago
Challenges and Research Directions for Adaptive Biometric Recognition Systems
Biometric authentication using mobile devices is becoming a convenient and important means to secure access to remote services such as telebanking and electronic transactions. Such...
Norman Poh, Rita Wong, Josef Kittler, Fabio Roli
CF
2009
ACM
14 years 2 months ago
A light-weight fairness mechanism for chip multiprocessor memory systems
Chip Multiprocessor (CMP) memory systems suffer from the effects of destructive thread interference. This interference reduces performance predictability because it depends heavil...
Magnus Jahre, Lasse Natvig
AIS
2004
Springer
14 years 28 days ago
Integrated Term Weighting, Visualization, and User Interface Development for Bioinformation Retrieval
This project implements an integrated biological information website that classifies technical documents, learns about users' interests, and offers intuitive interactive visua...
Min Hong, Anis Kairmpour-fard, Steve Russell, Lawr...
ICPR
2010
IEEE
13 years 12 months ago
Detecting Altered Fingerprints
Abstract--The widespread deployment of Automated Fingerprint Identification Systems (AFIS) in law enforcement and border control applications has heightened the need for ensuring t...
Jianjiang Feng, Anil Jain, Arun Ross