Sciweavers

535 search results - page 77 / 107
» The Ragnarok Architectural Software Configuration Management...
Sort
View
WWW
2005
ACM
14 years 9 months ago
Advanced fault analysis in web service composition
Currently, fault management in Web Services orchestrating multiple suppliers relies on a local analysis, that does not span across individual services, thus limiting the effective...
Anna Goy, Claudia Picardi, Daniele Theseider Dupr&...
UIST
1999
ACM
14 years 28 days ago
Using Properties for Uniform Interaction in the Presto Document System
Most document or information management systems rely on hierarchies to organise documents (e.g. files, email messages or web bookmarks). However, the rigid structures of hierarchi...
Paul Dourish, W. Keith Edwards, Anthony LaMarca, M...
KYOTODL
2000
87views more  KYOTODL 2000»
13 years 10 months ago
Modeling Customizable Web Applications
The web is more and more used as a platform for fullfledged, increasingly complex applications, where a huge amount of change-intensive data is managed by underlying database syst...
Gerti Kappel, Werner Retschitzegger, Wieland Schwi...
INFOSCALE
2007
ACM
13 years 10 months ago
A dubiety-determining based model for database cumulated anomaly intrusion
— The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify da...
Gang Lu, Junkai Yi, Kevin Lü
JODI
2010
115views more  JODI 2010»
13 years 3 months ago
ICE-Theorem - End to end semantically aware eResearch infrastructure for theses
: ICE-TheOREM was a project which made several important contributions to the repository domain, promoting deposit by integrating the repository with authoring workflows and enhanc...
Peter Sefton, Jim Downing