Sciweavers

1830 search results - page 186 / 366
» Implementing a Tamper-Evident Database System
Sort
View
128
Voted
ER
2009
Springer
166views Database» more  ER 2009»
15 years 10 months ago
A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations
Abstract. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes a vulnerability-cent...
Golnaz Elahi, Eric S. K. Yu, Nicola Zannone
ECOWS
2007
Springer
15 years 9 months ago
Model-Driven Performance Evaluation for Service Engineering
Service engineering and service-oriented architecture as an integration and platform technology is a recent approach to software systems integration. Software quality aspects such ...
Claus Pahl, Marko Boskovic, Wilhelm Hasselbring
133
Voted
EUC
2005
Springer
15 years 9 months ago
Wireless RFID Networks for Real-Time Customer Relationship Management
A new system for real-time customer relationship management is proposed. The system is based on deploying a network of RFID readers throughout an environment. Information about the...
C. Philipp Schloter, Hamid K. Aghajan
103
Voted
VLDB
1987
ACM
92views Database» more  VLDB 1987»
15 years 7 months ago
Mind Your Grammar: a New Approach to Modelling Text
Beginning to create the New Oxford English Dictionary database has resulted in the realization that databases for reference texts are unlike those for conventional enterprises. Wh...
Gaston H. Gonnet, Frank Wm. Tompa
BMCBI
2008
141views more  BMCBI 2008»
15 years 3 months ago
The development of PIPA: an integrated and automated pipeline for genome-wide protein function annotation
Background: Automated protein function prediction methods are needed to keep pace with high-throughput sequencing. With the existence of many programs and databases for inferring ...
Chenggang Yu, Nela Zavaljevski, Valmik Desai, Seth...