Sciweavers

1005 search results - page 82 / 201
» Information systems security engineering: a critical compone...
Sort
View
ISOLA
2004
Springer
14 years 2 months ago
Designing Safe, Reliable Systems using Scade
As safety critical systems increase in size and complexity, the need for efficient tools to verify their reliability grows. In this paper we present a tool that helps engineers des...
Parosh Aziz Abdulla, Johan Deneaux, Gunnar St&arin...
DAWAK
2009
Springer
13 years 6 months ago
Towards a Modernization Process for Secure Data Warehouses
Data Warehouses (DW) manage crucial enterprise information used for the decision making process which has to be protected from unauthorized accesses. However, security constraints ...
Carlos Blanco, Ricardo Pérez-Castillo, Arnu...
CCS
2011
ACM
12 years 9 months ago
SURF: detecting and measuring search poisoning
Search engine optimization (SEO) techniques are often abused to promote websites among search results. This is a practice known as blackhat SEO. In this paper we tackle a newly em...
Long Lu, Roberto Perdisci, Wenke Lee
RE
2004
Springer
14 years 2 months ago
Quantifying Non-Functional Requirements: A Process Oriented Approach
In this work, we propose a framework for quantifying non-functional requirements (NFRs). This framework uses quality characteristics of the execution domain, application domain an...
Raquel L. Hill, Jun Wang, Klara Nahrstedt
AAAI
1993
13 years 10 months ago
Automatically Constructing a Dictionary for Information Extraction Tasks
Knowledge-based natural language processing systems have achieved good success with certain tasks but they are often criticized because they depend on a domain-specific dictionar...
Ellen Riloff