Sciweavers

1989 search results - page 331 / 398
» Integrity Management in Component Based Systems
Sort
View
DATE
2010
IEEE
147views Hardware» more  DATE 2010»
15 years 6 months ago
Detecting/preventing information leakage on the memory bus due to malicious hardware
An increasing concern amongst designers and integrators of military and defense-related systems is the underlying security of the individual microprocessor components that make up ...
Abhishek Das, Gokhan Memik, Joseph Zambreno, Alok ...
ISSRE
2002
IEEE
15 years 9 months ago
Toward A Quantifiable Definition of Software Faults
An important aspect of developing models relating the number and type of faults in a software system to a set of structural measurement is defining what constitutes a fault. By de...
John C. Munson, Allen P. Nikora
132
Voted
WWW
2007
ACM
16 years 5 months ago
Mapping-driven XML transformation
Clio is an existing schema-mapping tool that provides user-friendly means to manage and facilitate the complex task of transformation and integration of heterogeneous data such as...
Haifeng Jiang, Howard Ho, Lucian Popa, Wook-Shin H...
132
Voted
EDBTW
2010
Springer
15 years 9 months ago
ODBIS: towards a platform for on-demand business intelligence services
In recent years, Software-as-a-Service (SaaS) is gaining momentum with more and more successful adoptions. Several companies including some well known names have embraced this new...
Moez Essaidi
SEFM
2007
IEEE
15 years 10 months ago
Model-driven architecture for cancer research
It is a common phenomenon for research projects to collect and analyse valuable data using ad-hoc information systems. These costly-to-build systems are often composed of incompat...
Radu Calinescu, Steve Harris, Jeremy Gibbons, Jim ...