Sciweavers

262 search results - page 9 / 53
» Providing Trusted Components to the Industry
Sort
View
APCCM
2009
14 years 10 months ago
Conceptual Business Document Modeling using UN/CEFACT's Core Components
Before two businesses can engage in a business-tobusiness process an agreement about the process execution order and the business documents exchanged in the collaborative process ...
Philipp Liegl
ECRTS
2005
IEEE
15 years 3 months ago
Fast Component Interaction for Real-Time Systems
Open real-time systems provide for co-hosting hard-, soft- and non-real-time applications. Microkernel-based designs in addition allow for these applications to be mutually protec...
Udo Steinberg, Jean Wolter, Hermann Härtig
JSS
2002
128views more  JSS 2002»
14 years 9 months ago
The cost of errors in software development: evidence from industry
The search for and correction of errors in software are often time consuming and expensive components of the total cost of software development. The current research investigates ...
J. Christopher Westland
ATC
2007
Springer
15 years 3 months ago
Enhancing Grid Security Using Trusted Virtualization
Abstract. Grid applications have increasingly sophisticated functional and security requirements. However, current techniques mostly protect only the resource provider from attacks...
Hans Löhr, HariGovind V. Ramasamy, Ahmad-Reza...
91
Voted
RECSYS
2009
ACM
15 years 3 months ago
Learning to recommend with trust and distrust relationships
With the exponential growth of Web contents, Recommender System has become indispensable for discovering new information that might interest Web users. Despite their success in th...
Hao Ma, Michael R. Lyu, Irwin King