Sciweavers

45 search results - page 7 / 9
» Model-Driven Development Meets Security: An Evaluation of Cu...
Sort
View
INFFUS
2002
162views more  INFFUS 2002»
13 years 7 months ago
Fusion of multiple classifiers
The security of computer networks plays a strategic role in modern computer systems. In order to enforce high protection levels against threats, a number of software tools have be...
Fabio Roli, Josef Kittler
EOR
2007
68views more  EOR 2007»
13 years 7 months ago
Multiattribute electronic procurement using goal programming
One of the key challenges of current day electronic procurement systems is to enable procurement decisions transcend beyond a single attribute such as cost. Consequently, multiatt...
S. Kameshwaran, Y. Narahari, Charles H. Rosa, Deva...
OOPSLA
2005
Springer
14 years 1 months ago
Ercatons and organic programming: say good-bye to planned economy
Organic programming (OP) is our proposed and already emerging programming model which overcomes some of the limitations of current practice in software development in general and ...
Oliver Imbusch, Falk Langhammer, Guido von Walter
ICC
2007
IEEE
164views Communications» more  ICC 2007»
14 years 1 months ago
A Framework of Attacker Centric Cyber Attack Behavior Analysis
—Cyber attack behavior analysis can be roughly classified as “network centric” and “attacker centric” approaches. Compared with traditional “network centric” approach...
Xuena Peng, Hong Zhao
WICON
2010
13 years 5 months ago
A Novel Web-enabled Healthcare Solution on HealthVault System
Complicated Electronic Medical Records (EMR) systems have created problems in systems regarding an easy implementation and interoperability for a Web-enabled Healthcare Solution, w...
Lingxia Liao, Min Chen, Son Vuong, Xiaorong Lai