Sciweavers

DISCEX
2003
IEEE
14 years 5 months ago
Towards a Rigorous Definition of Information System Survivability
The computer systems that provide the information underpinnings for critical infrastructure applications, both military and civilian, are essential to the operation of those appli...
John C. Knight, Elisabeth A. Strunk, Kevin J. Sull...
WWW
2010
ACM
14 years 5 months ago
Redundancy detection in service-oriented systems
This paper addresses the problem of identifying redundant data in large-scale service-oriented information systems. Specifically, the paper puts forward an automated method to pi...
Peep Küngas, Marlon Dumas
RSCTC
2004
Springer
116views Fuzzy Logic» more  RSCTC 2004»
14 years 5 months ago
Constrained Sums of Information Systems
We study properties of infomorphisms between information systems. In particular, we interpret infomorphisms between information systems in terms of sums with constraints (constrain...
Andrzej Skowron, Jaroslaw Stepaniuk
ICMI
2004
Springer
196views Biometrics» more  ICMI 2004»
14 years 5 months ago
Evaluation of spoken multimodal conversation
Spoken multimodal dialogue systems in which users address faceonly or embodied interface agents have been gaining ground in research for some time. Although most systems are still...
Niels Ole Bernsen, Laila Dybkjær
EWSA
2004
Springer
14 years 5 months ago
Experiences Using Viewpoints for Information Systems Architecture: An Industrial Experience Report
There has recently been an increase in interest, among information systems architecture practitioners, in using viewpoints for architectural definition and description. This has be...
Eoin Woods
DRM
2004
Springer
14 years 5 months ago
Tamper detection and localization for categorical data using fragile watermarks
Today, database relations are widely used and distributed over the Internet. Since these data can be easily tampered with, it is critical to ensure the integrity of these data. In...
Yingjiu Li, Huiping Guo, Sushil Jajodia
CAISE
2004
Springer
14 years 5 months ago
Secure Databases: An Analysis of Clark-Wilson Model in a Database Environment
Abstract. Information systems are vulnerable to accidental or malicious attacks. Security models for commercial computer systems exist, but information systems security is often ig...
Xiaocheng Ge, Fiona Polack, Régine Laleau
CAISE
2004
Springer
14 years 5 months ago
Business Alignment: Using Process Mining as a Tool for Delta Analysis
Fueled by the omnipresence of event logs in transactional information systems (cf. WFM, ERP, CRM, SCM, and B2B systems), process mining has become a vivid research area. Until rece...
Wil M. P. van der Aalst
SAC
2004
ACM
14 years 5 months ago
Towards a flexible, process-oriented IT architecture for an integrated healthcare network
Healthcare information systems play an important role in improving healthcare quality. As providing healthcare increasingly changes from isolated treatment episodes towards a cont...
Mario Beyer, Klaus Kuhn, Christian Meiler, Stefan ...
IQIS
2004
ACM
14 years 5 months ago
A Framework for Analysis of Data Freshness
Data freshness has been identified as one of the most important data quality attributes in information systems. This importance increases particularly in the context of distribute...
Mokrane Bouzeghoub, Verónika Peralta