Sciweavers

2421 search results - page 117 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
108
Voted
IC
2003
15 years 2 months ago
An Architecture for Efficient, Flexible Enterprise System Integration
Integrating complex enterprise systems is challenging and reliability and performance of the integrated systems can be problematic when using typical solutions of distributed tran...
John C. Grundy, Jun Bai, John Blackham, John G. Ho...
BMCBI
2008
102views more  BMCBI 2008»
15 years 26 days ago
Improving protein function prediction methods with integrated literature data
Background: Determining the function of uncharacterized proteins is a major challenge in the post-genomic era due to the problem's complexity and scale. Identifying a protein...
Aaron Gabow, Sonia M. Leach, William A. Baumgartne...
109
Voted
IJNSEC
2006
89views more  IJNSEC 2006»
15 years 22 days ago
Mitigation of Insider Risks using Distributed Agent Detection, Filtering, and Signaling
An insider-robust approach to file integrity verification is developed using interacting strata of mobile agents. Previous approaches relied upon monolithic architectures, or more...
Adam J. Rocke, Ronald F. DeMara
ICSE
2010
IEEE-ACM
14 years 11 months ago
Integrating legacy systems with MDE
Integrating several legacy software systems together is commonly performed with multiple applications of the Adapter Design Pattern in oo languages such as Java. The integration i...
Mickael Clavreul, Olivier Barais, Jean-Marc J&eacu...
BMVC
2001
15 years 3 months ago
Classifying Surveillance Events from Attributes and Behaviour
In order to develop a high-level description of events unfolding in a typical surveillance scenario, each successfully tracked event must be classified into type and behaviour. I...
Paolo Remagnino, Graeme A. Jones