Sciweavers

433 search results - page 87 / 87
» Integrating Safety and Security Requirements into Design of ...
Sort
View
BMCBI
2004
173views more  BMCBI 2004»
13 years 5 months ago
d-matrix - database exploration, visualization and analysis
Background: Motivated by a biomedical database set up by our group, we aimed to develop a generic database front-end with embedded knowledge discovery and analysis features. A maj...
Dominik Seelow, Raffaello Galli, Siegrun Mebus, Ha...
ECBS
2000
IEEE
87views Hardware» more  ECBS 2000»
13 years 10 months ago
Limited Software Warranties
Because there are di erent types of software (e.g., language, application, target environment, etc.), di erent software certi cation methodologies are needed. Software process imp...
Jeffrey M. Voas
ER
2004
Springer
169views Database» more  ER 2004»
13 years 11 months ago
Intentional Modeling to Support Identity Management
Identity management has arisen as a major and urgent challenge for internet-based communications and information services. Internet services involve complex networks of relationshi...
Lin Liu, Eric S. K. Yu