Sciweavers

440 search results - page 64 / 88
» Component-Based Architecture for e-Gov Web Systems Developme...
Sort
View
68
Voted
ECIS
2004
14 years 11 months ago
Agile Security For Information Warfare: A Call For Research
The context of information security is changing dramatically. Networking technologies have driven the global expansion of electronic commerce. Electronic commerce is increasingly ...
Richard Baskerville
SSDBM
2003
IEEE
118views Database» more  SSDBM 2003»
15 years 2 months ago
A Practical Approach for Microscopy Imaging Data Management (MIDM) in Neuroscience
Current data management approaches can easily handle the relatively simple requirements for molecular biology research but not the more varied and sophisticated microscopy imaging...
Shenglan Zhang, Xufei Qian, Amarnath Gupta, Maryan...
83
Voted
BILDMED
2007
142views Algorithms» more  BILDMED 2007»
14 years 11 months ago
Interfacing Global and Local CBIR Systems for Medical Image Retrieval
Abstract. Contemporary picture archiving and communication systems are limited in managing large and varied image collections, because content-based image retrieval (CBIR) methods ...
Sameer Antani, Thomas Martin Deserno, L. Rodney Lo...
ENTCS
2002
145views more  ENTCS 2002»
14 years 9 months ago
Combining Monitors for Runtime System Verification
Runtime verification permits checking system properties that cannot be fully verified off-line. This is particularly true when the system includes complex third-party components, ...
Joshua Levy, Hassen Saïdi, Tomás E. Ur...
PET
2004
Springer
15 years 3 months ago
A Formal Privacy System and Its Application to Location Based Services
There are a variety of well-known models for access control developed for purposes like formally modeling the access rights on files, databases, and web resources. However, the ex...
Carl A. Gunter, Michael J. May, Stuart G. Stubbleb...