Sciweavers

3920 search results - page 563 / 784
» Challenges in Software Evolution
Sort
View
CHI
2010
ACM
15 years 11 months ago
Investigating user account control practices
Non-administrator user accounts and the user account control (UAC) approach of Windows Vista are two practical solutions to limit the damage of malware infection. UAC in Windows V...
Sara Motiee, Kirstie Hawkey, Konstantin Beznosov
EDBTW
2010
Springer
15 years 11 months ago
Collaborative data privacy for the web
While data privacy is a human right, it is challenging to enforce it. For example, if multiple retailers execute a single order at Amazon Marketplace, each retailer can use diffe...
Clemens Heidinger, Erik Buchmann, Klemens Böh...
EDBTW
2010
Springer
15 years 11 months ago
Biochemical network matching and composition
Graph composition has applications in a variety of practical applications. In drug development, for instance, in order to understand possible drug interactions, one has to merge k...
Martin Hugh Goodfellow, John Wilson, Ela Hunt
CISIS
2009
IEEE
15 years 11 months ago
SAMOA - A Semi-Automated Ontology Alignment Method for Systems Integration in Safety-Critical Environments
The integration of heterogeneous data sources with even heterogeneous semantic meanings poses a challenge for data and system integrators. Ontology Alignment (OA) tries to identif...
Thomas Moser, Kathrin Schimper, Richard Mordinyi, ...
CISIS
2009
IEEE
15 years 11 months ago
Ontology-Based Generation of Bayesian Networks
Bayesian networks are indispensable for determining the probability of events which are influenced by various components. Bayesian probabilities encode degrees of belief about ce...
Stefan Fenz, A. Min Tjoa, Marcus Hudec