Sciweavers

308 search results - page 40 / 62
» An Agile Approach to a Legacy System
Sort
View
EUROSYS
2006
ACM
15 years 6 months ago
Reducing TCB complexity for security-sensitive applications: three case studies
The large size and high complexity of securitysensitive applications and systems software is a primary cause for their poor testability and high vulnerability. One approach to all...
Lenin Singaravelu, Calton Pu, Hermann Härtig,...
JOT
2008
445views more  JOT 2008»
14 years 9 months ago
From The Business Motivation Model (BMM) To Service Oriented Architecture (SOA)
The purpose of this article is to provide a brief insight about how to link your business vision, goals, strategies, tactics as well as business rules according to BMM, then bridg...
Birol Berkem
ICIP
2009
IEEE
15 years 10 months ago
Ppiq: A Probabilistic Framework For Image Quality Assessment
In this paper a framework for Image Quality Assessment (IQA) is introduced based on the properties of Receptive Fields (RFs) which are the primary mechanism for detection of visua...
NCA
2009
IEEE
15 years 4 months ago
Sharing Private Information Across Distributed Databases
—In industries such as healthcare, there is a need to electronically share privacy-sensitive data across distinct organizations. We show how this can be done while allowing organ...
Michael Siegenthaler, Ken Birman
TES
2005
Springer
15 years 2 months ago
A Lightweight Model-Driven Orchestration Engine for e-Services
Service-oriented Computing (SoC) in general, and e-service orchestrations in particular have the potential to increase reuse and to ease maintainability. Typically, interoperating ...
Johann Oberleitner, Florian Rosenberg, Schahram Du...