Sciweavers

211 search results - page 15 / 43
» Modeling security as a dependability attribute: a refinement...
Sort
View
BCS
2008
13 years 9 months ago
Tools for Traceable Security Verification
Dependable systems evolution has been identified by the UK Computing Research Committee (UKCRC) as one of the current grand challenges for computer science. We present work toward...
Jan Jürjens, Yijun Yu, Andreas Bauer 0002
ICDM
2008
IEEE
156views Data Mining» more  ICDM 2008»
14 years 2 months ago
Exploiting Local and Global Invariants for the Management of Large Scale Information Systems
This paper presents a data oriented approach to modeling the complex computing systems, in which an ensemble of correlation models are discovered to represent the system status. I...
Haifeng Chen, Haibin Cheng, Guofei Jiang, Kenji Yo...
ICDE
2010
IEEE
401views Database» more  ICDE 2010»
14 years 4 months ago
Continuous Query Evaluation over Distributed Sensor Networks
— In this paper1 we address the problem of processing continuous multi-join queries, over distributed data streams. Our approach makes use of existing work in the field of publi...
Oana Jurca, Sebastian Michel, Alexandre Herrmann, ...
ISI
2006
Springer
13 years 7 months ago
Inferring Privacy Information from Social Networks
Since privacy information can be inferred via social relations, the privacy confidentiality problem becomes increasingly challenging as online social network services are more popu...
Jianming He, Wesley W. Chu, Zhenyu Liu
WSC
1997
13 years 9 months ago
A Simulation-Based Backward Planning Approach for Order-Release
The problem of order release planning for a make-toorder production facility is addressed. Traditionally, order-release planning in a multi-stage shop is performed with material r...
Edward F. Watson, Deborah J. Medeiros, Randall P. ...