Sciweavers

2178 search results - page 392 / 436
» Toward Systemically Secure IT Architectures
Sort
View
ICWS
2009
IEEE
14 years 4 months ago
SOA-Based Integration of the Internet of Things in Enterprise Services
Advances in the areas of embedded systems, computing, and networking are leading to an infrastructure composed of millions of heterogeneous devices. These devices will not simply ...
Patrik Spiess, Stamatis Karnouskos, Dominique Guin...
ICDE
2009
IEEE
195views Database» more  ICDE 2009»
14 years 2 months ago
The PRISM Workwench: Database Schema Evolution without Tears
— Information Systems are subject to a perpetual evolution, which is particularly pressing in Web Information Systems, due to their distributed and often collaborative nature. Su...
Carlo Curino, Hyun J. Moon, MyungWon Ham, Carlo Za...
GECCO
2005
Springer
149views Optimization» more  GECCO 2005»
14 years 1 months ago
There's more to a model than code: understanding and formalizing in silico modeling experience
Mapping biology into computation has both a domain specific aspect – biological theory – and a methodological aspect – model development. Computational modelers have implici...
Janet Wiles, Nicholas Geard, James Watson, Kai Wil...
WOSS
2004
ACM
14 years 1 months ago
Combining statistical monitoring and predictable recovery for self-management
Complex distributed Internet services form the basis not only of e-commerce but increasingly of mission-critical networkbased applications. What is new is that the workload and in...
Armando Fox, Emre Kiciman, David A. Patterson
MEDINFO
2007
131views Healthcare» more  MEDINFO 2007»
13 years 9 months ago
Utilizing SELinux to Mandate Ultra-secure Access Control of Medical Records
Ongoing concerns have been raised over the effectiveness of information technology products and systems in maintaining privacy protection for sensitive data. The aim is to ensure ...
Peter R. Croll, Matthew Henricksen, William J. Cae...