Sciweavers

636 search results - page 88 / 128
» The AXML Artifact Model
Sort
View
INFOCOM
2007
IEEE
14 years 2 months ago
Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information
Abstract—We propose a novel algorithm for detecting wormhole attacks in wireless multi-hop networks. The algorithm uses only connectivity information to look for forbidden substr...
Ritesh Maheshwari, Jie Gao, Samir R. Das
ICSOC
2007
Springer
14 years 1 months ago
Architectural Decisions and Patterns for Transactional Workflows in SOA
Abstract. An important architectural style for constructing enterprise applications is to use transactional workflows in SOA. In this setting, workflow activities invoke distribute...
Olaf Zimmermann, Jonas Grundler, Stefan Tai, Frank...
ER
2004
Springer
246views Database» more  ER 2004»
14 years 1 months ago
Data Mapping Diagrams for Data Warehouse Design with UML
Abstract. In Data Warehouse (DW) scenarios, ETL (Extraction, Transformation, Loading) processes are responsible for the extraction of data from heterogeneous operational data sourc...
Sergio Luján-Mora, Panos Vassiliadis, Juan ...
APSEC
1999
IEEE
14 years 2 days ago
Enhancing the Object Constraint Language for More Expressive Specifications
The Object Constraint Language (OCL) is a precise language which could be used for describing constraints on object-oriented models and other modelling artifacts. The kind of cons...
Ali Hamie
ICIAR
2010
Springer
13 years 11 months ago
Segmentation Based Noise Variance Estimation from Background MRI Data
Accurate and precise estimation of the noise variance is often of key importance as an input parameter for posterior image processing tasks. In MR images, background data is well s...
Jeny Rajan, Dirk Poot, Jaber Juntu, Jan Sijbers