Sciweavers

3831 search results - page 654 / 767
» Dynamic Context Logic
Sort
View
81
Voted
USS
2008
15 years 3 months ago
Modeling the Trust Boundaries Created by Securable Objects
One of the most critical steps of any security review involves identifying the trust boundaries that an application is exposed to. While methodologies such as threat modeling can ...
Matt Miller
CAISE
2008
Springer
15 years 2 months ago
On Modeling and Analyzing Cost Factors in Information Systems Engineering
Introducing enterprise information systems (EIS) is usually associated with high costs. It is therefore crucial to understand those factors that determine or influence these costs....
Bela Mutschler, Manfred Reichert
CAISE
2008
Springer
15 years 2 months ago
Improving Data Independence, Efficiency and Functional Flexibility of Integration Platforms
The concept of Enterprise Application Integration (EAI) is widely used for integrating heterogeneous applications and systems by message-based communication. Typically, EAI servers...
Matthias Böhm, Jürgen Bittner, Dirk Habi...
CBMS
2008
IEEE
15 years 2 months ago
Effectiveness of Local Feature Selection in Ensemble Learning for Prediction of Antimicrobial Resistance
In the real world concepts are often not stable but change over time. A typical example of this in the biomedical context is antibiotic resistance, where pathogen sensitivity may ...
Seppo Puuronen, Mykola Pechenizkiy, Alexey Tsymbal
DCOSS
2008
Springer
15 years 2 months ago
Efficient Node Discovery in Mobile Wireless Sensor Networks
Energy is one of the most crucial aspects in real deployments of mobile sensor networks. As a result of scarce resources, the duration of most real deployments can be limited to ju...
Vladimir Dyo, Cecilia Mascolo