Sciweavers

3394 search results - page 599 / 679
» Hybrid Application Support for Mobile Information Systems
Sort
View
CCS
2004
ACM
14 years 2 months ago
MAC and UML for secure software design
Security must be a first class citizen in the design of large scale, interacting, software applications, at early and all stages of the lifecycle, for accurate and precise policy ...
Thuong Doan, Steven A. Demurjian, T. C. Ting, Andr...
SIGMOD
2008
ACM
214views Database» more  SIGMOD 2008»
14 years 9 months ago
A graph method for keyword-based selection of the top-K databases
While database management systems offer a comprehensive solution to data storage, they require deep knowledge of the schema, as well as the data manipulation language, in order to...
Quang Hieu Vu, Beng Chin Ooi, Dimitris Papadias, A...
HPDC
2010
IEEE
13 years 10 months ago
Data parallelism in bioinformatics workflows using Hydra
Large scale bioinformatics experiments are usually composed by a set of data flows generated by a chain of activities (programs or services) that may be modeled as scientific work...
Fábio Coutinho, Eduardo S. Ogasawara, Danie...
WWW
2010
ACM
14 years 3 months ago
On the high density of leadership nuclei in endorsement social networks
In this paper we study the community structure of endorsement networks, i.e., social networks in which a directed edge u → v is asserting an action of support from user u to use...
Guillermo Garrido, Francesco Bonchi, Aristides Gio...
JCDL
2006
ACM
133views Education» more  JCDL 2006»
14 years 2 months ago
Repository software evaluation using the audit checklist for certification of trusted digital repositories
The NDIIPP ECHO DEPository project [1] digital repository evaluation will use an augmented version of the draft Audit Checklist for Certification of Trusted Digital Repositories (...
Joanne Kaczmarek, Thomas G. Habing, Janet Eke