Sciweavers

4678 search results - page 827 / 936
» Integrated University Information Systems
Sort
View
DSN
2008
IEEE
15 years 6 months ago
Anomaly? application change? or workload change? towards automated detection of application performance anomaly and change
: Automated tools for understanding application behavior and its changes during the application life-cycle are essential for many performance analysis and debugging tasks. Applicat...
Ludmila Cherkasova, Kivanc M. Ozonat, Ningfang Mi,...
SP
2007
IEEE
137views Security Privacy» more  SP 2007»
15 years 6 months ago
A Cryptographic Decentralized Label Model
Information-flow security policies are an appealing way of specifying confidentiality and integrity policies in information systems. Most previous work on language-based securit...
Jeffrey A. Vaughan, Steve Zdancewic
CAISE
2007
Springer
15 years 6 months ago
Declarative XML Data Cleaning with XClean
Data cleaning is the process of correcting anomalies in a data source, that may for instance be due to typographical errors, or duplicate representations of an entity. It is a cruc...
Melanie Weis, Ioana Manolescu
ADBIS
2004
Springer
224views Database» more  ADBIS 2004»
15 years 5 months ago
Using Ontologies for Database Query Reformulation
Abstract. Query reformulation techniques based on semantic knowledge have been used in two ways in database management systems, namely for query optimization and for data integrati...
Chokri Ben Necib, Johann Christoph Freytag
CAISE
2004
Springer
15 years 5 months ago
Network-based Business Process Management: a Discussion on Embedding Business Logic in Communications Networks
Advanced Business Process Management (BPM) tools enable the decomposition of previously integrated and often ill-defined processes into reusable process modules. These process modu...
Louis-François Pau, Peter H. M. Vervest