Sciweavers

Share
IRI
2006
IEEE
10 years 5 months ago
Applying the layered decision model to the design of language-based security systems
Safeguarding practices for networked systems involves decisions in at least three areas: identification of welldefined security policies, selection of cost-effective defense strat...
Huaqiang Wei, Jim Alves-Foss
IRI
2006
IEEE
10 years 5 months ago
Toward component non-functional interoperability analysis: A UML-based and goal-oriented approach
Component interoperability is the ability of two or more components to cooperate despite their differences in functional and non-functional aspects such as security or performanc...
Sam Supakkul, Ebenezer A. Oladimeji, Lawrence Chun...
IRI
2006
IEEE
10 years 5 months ago
Towards a model-based application integration framework for smart oilfields
Cong Zhang, Amol Bakshi, Viktor K. Prasanna, Will ...
IRI
2006
IEEE
10 years 5 months ago
T2K2: A type II KASER
—The transformational methodology described in this paper induces new knowledge, which may be open under any deductive process. The method of transposition is used to maintain a ...
Stuart Harvey Rubin, Shu-Ching Chen, James B. Law
IRI
2006
IEEE
10 years 5 months ago
A new model for the itinerary definition of real-time imprecise mobile agents
In information retrieving applications, mobile agents may have to finish their mission before a deadline. Also, there may be some flexibility for the itinerary definition due to o...
Luciana Rech, Carlos Montez, Rômulo Silva de...
IRI
2006
IEEE
10 years 5 months ago
Targeting and localization for mars rover operations
— In this work we discuss how the quality of localization knowledge impacts the remote operation of rovers on the surface of Mars. We look at the techniques of localization estim...
Mark W. Powell, Thomas Crockett, Jason Fox, Joseph...
IRI
2006
IEEE
10 years 5 months ago
Environment as support for simplification, reuse and integration of processes in spatial MAS
The development of solutions to complex problems requires finding answers to several questions which are obstacles on the road leading to the solution. To perpetuate progress, the...
Denis Payet, Rémy Courdier, Nicolas S&eacut...
IRI
2006
IEEE
10 years 5 months ago
A similarity based technique for detecting malicious executable files for computer forensics
With the rapidly increasing complexity of computer systems and the sophistication of hacking tools and techniques, there is a crucial need for computer forensic analysis technique...
Jun-Hyung Park, Minsoo Kim, BongNam Noh, James B. ...
IRI
2006
IEEE
10 years 5 months ago
Rapid systems of systems integration - combining an architecture-centric approach with enterprise service bus infrastructure
Rapid, yet methodical, systems of systems integration is in high demand. Application areas such as homeland security and disaster response add to the challenge because of a unique...
Ingolf Krüger, Michael Meisinger, Massimilian...
IRI
2006
IEEE
10 years 5 months ago
An RDF-based annotation framework for providing web resources integrity
: Data integrity of web resources is becoming more and more important with the increasing development of Internet. In the context of active intermediaries, current solution for dat...
Dejun Jiang, Chi-Hung Chi, Lin Liu
books