Sciweavers

915 search results - page 173 / 183
» Security in Business Process Engineering
Sort
View
EUROSYS
2008
ACM
14 years 4 months ago
Application-level isolation and recovery with solitude
When computer systems are compromised by an attack, it is difficult to determine the precise extent of the damage caused by the attack because the state changes made by an attack...
Shvetank Jain, Fareha Shafique, Vladan Djeric, Ash...
SP
2007
IEEE
135views Security Privacy» more  SP 2007»
14 years 1 months ago
Exploring Multiple Execution Paths for Malware Analysis
Malicious code (or malware) is defined as software that fulfills the deliberately harmful intent of an attacker. Malware analysis is the process of determining the behavior and ...
Andreas Moser, Christopher Krügel, Engin Kird...
WWW
2003
ACM
14 years 8 months ago
Supporting Cooperative Activities with Shared Hypermedia Workspaces on the WWW
Team members usually cooperate on a business process by partitioning it into several activities, which in turn generate one or more work items. Work items either need to be proces...
Jörg M. Haake, Jessica Rubart, Weigang Wang
BTW
2009
Springer
240views Database» more  BTW 2009»
13 years 8 months ago
Efficient Adaptive Retrieval and Mining in Large Multimedia Databases
Abstract: Multimedia databases are increasingly common in science, business, entertainment and many other applications. Their size and high dimensionality of features are major cha...
Ira Assent
SIGUCCS
2000
ACM
13 years 12 months ago
Web Documentation Project at the University of Delaware
The Web Documentation Project at the University of Delaware (UD) organizes the computing help information available to the University community. The project’s goal is to provide...
David Hopkins