Sciweavers

127 search results - page 21 / 26
» Practical Ontology Systems for Enterprise Application
Sort
View
CCS
2007
ACM
14 years 2 months ago
Improving multi-tier security using redundant authentication
Multi-tier web server systems are used in many important contexts and their security is a major cause of concern. Such systems can exploit strategies like least privilege to make ...
Jodie P. Boyer, Ragib Hasan, Lars E. Olson, Nikita...
OSDI
2008
ACM
14 years 10 months ago
On the Impact of Disk Scrubbing on Energy Savings
The increasing use of computers for saving valuable data imposes stringent reliability constraints on storage systems. Reliability improvement via use of redundancy is a common pr...
Guanying Wang, Ali Raza Butt, Chris Gniady
WWW
2004
ACM
14 years 10 months ago
CS AKTive space: representing computer science in the semantic web
We present a Semantic Web application that we call CS AKTive Space1 . The application exploits a wide range of semantically heterogeneous and distributed content relating to Compu...
Monica M. C. Schraefel, Nigel R. Shadbolt, Nichola...
OTM
2005
Springer
14 years 3 months ago
Semantic Transformation of Web Services
Abstract. Web services have become the predominant paradigm for the development of distributed software systems. Web services provide the means to modularize software in a way that...
David Bell, Sergio de Cesare, Mark Lycett
EDOC
2008
IEEE
14 years 4 months ago
Managing the Life Cycle of Access Rules in CEOSIS
The definition and management of access rules (e.g., to control the access to business documents and business functions) is an important task within any enterprise information sy...
Stefanie Rinderle-Ma, Manfred Reichert