Sciweavers

249 search results - page 46 / 50
» Modelling Security Goals in Business Processes
Sort
View
WISA
2009
Springer
14 years 2 months ago
A Comparative Study of Mutual Information Analysis under a Gaussian Assumption
In CHES 2008 a generic side-channel distinguisher, Mutual Information, has been introduced to be independent of the relation between measurements and leakages as well as between le...
Amir Moradi, Nima Mousavi, Christof Paar, Mahmoud ...
TREC
2008
13 years 9 months ago
TREC 2008 at the University at Buffalo: Legal and Blog Track
In the TREC 2008, the team from the State University of New York at Buffalo participated in the Legal track and the Blog track. For the Legal track, we worked on the interactive s...
Jianqiang Wang, Ying Sun, Omar Mukhtar, Rohini K. ...
JBCS
2010
152views more  JBCS 2010»
13 years 6 months ago
Evolution support in heterogeneous service-oriented landscapes
We present an incarnation of the Enterprise Physics vision sketched in [3] that provides automatic or semi-automatic support for evolution and change management in heterogeneous le...
Tiziana Margaria, Bernhard Steffen, Christian Kubc...
ICDE
2010
IEEE
178views Database» more  ICDE 2010»
13 years 7 months ago
Autonomic workload execution control using throttling
— Database Management Systems (DBMSs) are often required to simultaneously process multiple diverse workloads while enforcing business policies that govern workload performance. ...
Wendy Powley, Patrick Martin, Mingyi Zhang, Paul B...
NORDICHI
2004
ACM
14 years 1 months ago
Procuring a usable system using unemployed personas
This case study examines a procurement project where the Swedish National Labor Market Administration (AMV) hired usability consultants in order to redesign their website for empl...
Erik Markensten, Henrik Artman