Sciweavers

440 search results - page 80 / 88
» Supporting Executable Mappings in Model Management
Sort
View
SAC
2004
ACM
14 years 28 days ago
Using mobile agents as roaming security guards to test and improve security of hosts and networks
1 This paper discusses the design and implementation details of MAST (Mobile Agent-based Security Tool), a new mobile agentbased network security approach. MAST has been designed t...
Marco M. Carvalho, Thomas B. Cowin, Niranjan Suri,...
ICFEM
2004
Springer
14 years 26 days ago
Verifying a File System Implementation
Abstract. We present a correctness proof for a basic file system implementation. This implementation contains key elements of standard Unix file systems such as inodes and fixed...
Konstantine Arkoudas, Karen Zee, Viktor Kuncak, Ma...
METRICS
1999
IEEE
13 years 11 months ago
Measurements Should Generate Value, Rather than Data
Success factors for measurement programs as identified in the literature typically focus on the `internals' of the measurement program: incremental implementation, support fr...
Frank Niessink, Hans van Vliet
ICDE
2007
IEEE
157views Database» more  ICDE 2007»
13 years 11 months ago
Representing Data Quality for Streaming and Static Data
In smart item environments, multitude of sensors are applied to capture data about product conditions and usage to guide business decisions as well as production automation proces...
Anja Klein, Hong Hai Do, Gregor Hackenbroich, Marc...
CISIS
2009
IEEE
14 years 2 months ago
SAMOA - A Semi-Automated Ontology Alignment Method for Systems Integration in Safety-Critical Environments
The integration of heterogeneous data sources with even heterogeneous semantic meanings poses a challenge for data and system integrators. Ontology Alignment (OA) tries to identif...
Thomas Moser, Kathrin Schimper, Richard Mordinyi, ...