Sciweavers

381 search results - page 60 / 77
» Business Informatics: An Engineering Perspective on Informat...
Sort
View
PVLDB
2010
143views more  PVLDB 2010»
14 years 10 months ago
Embellishing Text Search Queries To Protect User Privacy
Users of text search engines are increasingly wary that their activities may disclose confidential information about their business or personal profiles. It would be desirable f...
HweeHwa Pang, Xuhua Ding, Xiaokui Xiao
104
Voted
EUROSPI
2005
Springer
15 years 6 months ago
Safety Methods in Software Process Improvement
Even if the application developers produce software in accordance with the customer requirements, they cannot guarantee that the software will behave in a safe way during the lifet...
Torgrim Lauritsen, Tor Stålhane
EDBT
2008
ACM
130views Database» more  EDBT 2008»
16 years 16 days ago
Flexible Transaction Processing in the Argos Middleware
Transactional requirements, from new application domains and execution environments, are varying and may exceed traditional ACID properties. We believe that transactional middlewa...
Anna-Brith Arntsen, Marts Mortensen, Randi Karlsen...
EOR
2006
117views more  EOR 2006»
15 years 12 days ago
Heuristics for selecting robust database structures with dynamic query patterns
The success of a company increasingly depends on timely information (internal or external) being available to the right person at the right time for crucial managerial decision-ma...
Andrew N. K. Chen, Paulo B. Goes, Alok Gupta, Jame...
ICSM
2000
IEEE
15 years 4 months ago
Bridging Program Comprehension Tools by Design Navigation
Source code investigation is one of the most time consuming activities during software maintenance and evolution, yet currently available tool support suffers from several shortco...
Sébastien Robitaille, Reinhard Schauer, Rud...