Sciweavers

3544 search results - page 19 / 709
» Information Security in Open Systems
Sort
View
73
Voted
BMCBI
2008
122views more  BMCBI 2008»
14 years 10 months ago
OpenDMAP: An open source, ontology-driven concept analysis engine, with applications to capturing knowledge regarding protein tr
Background: Information extraction (IE) efforts are widely acknowledged to be important in harnessing the rapid advance of biomedical knowledge, particularly in areas where import...
Lawrence Hunter, Zhiyong Lu, James Firby, William ...
IJACTAICIT
2010
192views more  IJACTAICIT 2010»
14 years 7 months ago
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha
REFLECTION
2001
Springer
15 years 2 months ago
Performance and Integrity in the OpenORB Reflective Middleware
, are to address what we perceive as the most pressing shortcomings of current reflective middleware platforms. First, performance: in the worst case, this needs to be on a par wit...
Gordon S. Blair, Geoff Coulson, Michael Clarke, Ni...
FSKD
2006
Springer
125views Fuzzy Logic» more  FSKD 2006»
15 years 2 months ago
Towards Security Evaluation Based on Evidence Collection
Information security evaluation of software-intensive systems typically relies heavily on the experience of the security professionals. Obviously, automated approaches are needed ...
Reijo Savola