Sciweavers

2956 search results - page 271 / 592
» Databases and Higher Types
Sort
View
HICSS
2010
IEEE
152views Biometrics» more  HICSS 2010»
15 years 9 months ago
Increasing Software Security through Open Source or Closed Source Development? Empirics Suggest that We have Asked the Wrong Que
While many theoretical arguments against or in favor of open source and closed source software development have been presented, the empirical basis for the assessment of arguments...
Guido Schryen, Eliot Rich
ER
2001
Springer
96views Database» more  ER 2001»
15 years 8 months ago
Process Patterns to Generate E-commerce Systems
: In electronic commerce, two fundamental types of models are business models and process models. While a business model is concerned with value exchanges between actors, a process...
Prasad Jayaweera, Paul Johannesson, Petia Wohed
ADBIS
2000
Springer
88views Database» more  ADBIS 2000»
15 years 8 months ago
Finding Generalized Path Patterns for Web Log Data Mining
Conducting data mining on logs of web servers involves the determination of frequently occurring access sequences. We examine the problem of finding traversal patterns from web lo...
Alexandros Nanopoulos, Yannis Manolopoulos
DEXAW
1999
IEEE
142views Database» more  DEXAW 1999»
15 years 8 months ago
Developments in Spatio-Temporal Query Languages
ing spatio-temporal data as abstract data types into already existing data models is a promising approach to creating spatio-temporal query languages. In this context, an importan...
Martin Erwig, Markus Schneider
DEXAW
1999
IEEE
75views Database» more  DEXAW 1999»
15 years 8 months ago
Coordination of Security Levels for Internet Architectures
Internet systems provide a variety of ways to exchange information, contain large amounts and variety of data, and have become quite complex, making them vulnerable to attacks fro...
Eduardo B. Fernández