Sciweavers

652 search results - page 119 / 131
» Reconciling Software Requirements and Architectures: The CBS...
Sort
View
DAC
1998
ACM
14 years 8 months ago
Watermarking Techniques for Intellectual Property Protection
Digital system designs are the product of valuable effort and knowhow. Their embodiments, from software and HDL program down to device-level netlist and mask data, represent caref...
Andrew B. Kahng, John Lach, William H. Mangione-Sm...
ICWS
2007
IEEE
13 years 9 months ago
Virtualised Trusted Computing Platform for Adaptive Security Enforcement of Web Services Interactions
Security enforcement framework is an important aspect of any distributed system. With new requirements imposed by SOA-based business models, adaptive security enforcement on the a...
Ivan Djordjevic, Srijith K. Nair, Theodosis Dimitr...
MEDINFO
2007
116views Healthcare» more  MEDINFO 2007»
13 years 9 months ago
Knowledge-Level Querying of Temporal Patterns in Clinical Research Systems
Managing time-stamped data is essential to clinical research activities and often requires the use of considerable domain knowledge, which is difficult to support within database ...
Martin J. O'Connor, Ravi D. Shankar, David B. Parr...
HICSS
2009
IEEE
155views Biometrics» more  HICSS 2009»
14 years 2 months ago
Collaborative Recommender Systems for Building Automation
Building Automation Systems (BASs) can save building owners money by reducing energy consumption while simultaneously preserving occupant comfort. There are algorithms that optimi...
Michael LeMay, Jason J. Haas, Carl A. Gunter
ICECCS
2009
IEEE
161views Hardware» more  ICECCS 2009»
14 years 2 months ago
Formal Modelling and Analysis of Business Information Applications with Fault Tolerant Middleware
Distributed information systems are critical to the functioning of many businesses; designing them to be dependable is a challenging but important task. We report our experience i...
Jeremy Bryans, John S. Fitzgerald, Alexander Roman...