Sciweavers

1830 search results - page 323 / 366
» Implementing a Tamper-Evident Database System
Sort
View
IKE
2004
15 years 2 months ago
Conditional Mapping in Data Mediation
A serious problem facing many organizations today is the need to share information among systems that have been developed separately. Conflicts in the structure and semantics of t...
Paul L. Bergstein, Vishal Shah
ISSA
2004
15 years 2 months ago
A Framework For Monitoring Insider Misuse Of It Applications
Many security incidents involve legitimate users who misuse their existing privileges, such that they have the system-level right to perform an action, but not the moral or ethica...
Aung Htike Phyo
ECIS
2003
15 years 2 months ago
Hybrid XML data model architecture for efficient document management
XML has been known as a document standard in representation and exchange of data on the Internet, and is also used as a standard language for the search and reuse of scattered doc...
Eun-Young Kim, Jin-Ho Choi, Jhung-Soo Hong, Tae-Hu...
116
Voted
ERSA
2003
147views Hardware» more  ERSA 2003»
15 years 2 months ago
Towards Run-Time Re-Configurable Techniques for Real-Time Embedded Applications
Many embedded applications can benefit from the flexible custom computing opportunities that FPGA technology offers. The Run-Time Reconfiguration (RTR) of the FPGA as an applicati...
Timothy F. Oliver, Douglas L. Maskell
122
Voted
PDSE
2000
116views more  PDSE 2000»
15 years 1 months ago
A CORBA-Based Architecture for Adding Dependability to Legacy Servers
This work presents a flexible, CORBA compliant Middle-Tier Server architecture which is capable of adding dependability (namely, reliability, availability, and performability) to ...
Domenico Cotroneo, Luigi Romano, Stefano Russo, Ni...