Sciweavers

2328 search results - page 399 / 466
» Component Frameworks - A Case Study
Sort
View
COMPSAC
2005
IEEE
15 years 9 months ago
Detecting Intrusions Specified in a Software Specification Language
To protect software against malicious activities, organizations are required to monitor security breaches. Intrusion Detection Systems (IDS) are those kinds of monitoring tools th...
Mohammad Feroz Raihan, Mohammad Zulkernine
SEFM
2005
IEEE
15 years 9 months ago
Description Logics for Shape Analysis
Verification of programs requires reasoning about sets of program states. In case of programs manipulating pointers, program states are pointer graphs. Verification of such prog...
Lilia Georgieva, Patrick Maier
SOUPS
2005
ACM
15 years 9 months ago
Attacking information visualization system usability overloading and deceiving the human
Information visualization is an effective way to easily comprehend large amounts of data. For such systems to be truly effective, the information visualization designer must be aw...
Gregory J. Conti, Mustaque Ahamad, John T. Stasko
AIME
2005
Springer
15 years 9 months ago
Ontology of Time and Situoids in Medical Conceptual Modeling
Time, events, changes, and processes play a major role in medical conceptual modeling. Representation of time-structures and reasoning about time-oriented medical data are importan...
Heinrich Herre, Barbara Heller
BPM
2005
Springer
118views Business» more  BPM 2005»
15 years 9 months ago
Applying Enterprise Models to Design Cooperative Scientific Environments
Scientific experiments are supported by activities that create, use, communicate and distribute information whose organizational dynamics is similar to processes performed by distr...
Andrea Bosin, Nicoletta Dessì, Maria Grazia...