Sciweavers

10038 search results - page 1762 / 2008
» Model Checking for Managers
Sort
View
EGOV
2009
Springer
15 years 11 months ago
eGIF4M: eGovernment Interoperability Framework for Mozambique
Harmonizing decentralized development of ICT solutions with centralized strategies, e.g., meant to favor reuse and optimization of resources, is a complex technical and organizatio...
Pavel Shvaiko, Adolfo Villafiorita, Alessandro Zor...
ISCIS
2009
Springer
15 years 11 months ago
A web-based data source for metabolomics
—With the development of improved and cost-effective technologies, it is now possible to detect thousands of metabolites in biofluids or specific organs, and reliably quantify th...
Ali Cakmak, Arun Dsouza, Richard Hanson, Gultekin ...
ISMIS
2009
Springer
15 years 11 months ago
Discovering Structured Event Logs from Unstructured Audit Trails for Workflow Mining
Workflow mining aims to find graph-based process models based on activities, emails, and various event logs recorded in computer systems. Current workflow mining techniques mainly ...
Liqiang Geng, Scott Buffett, Bruce Hamilton, Xin W...
152
Voted
ISW
2009
Springer
15 years 11 months ago
Towards Security Notions for White-Box Cryptography
Abstract. While code obfuscation attempts to hide certain characteristics of a program independently of an application, white-box cryptography (WBC) specifically focuses on softwa...
Amitabh Saxena, Brecht Wyseur, Bart Preneel
ISW
2009
Springer
15 years 11 months ago
Privacy-Aware Attribute-Based Encryption with User Accountability
As a new public key primitive, attribute-based encryption (ABE) is envisioned to be a promising tool for implementing fine-grained access control. To further address the concern o...
Jin Li, Kui Ren, Bo Zhu, Zhiguo Wan
« Prev « First page 1762 / 2008 Last » Next »