Sciweavers

10670 search results - page 18 / 2134
» Required Information Release
Sort
View
IEEEARES
2008
IEEE
15 years 3 months ago
Towards Comprehensive Requirement Analysis for Data Warehouses: Considering Security Requirements
—Data warehouse (DW) systems integrate data from heterogeneous sources and are used by decision makers to analyze the status and the development of an organization. Traditionally...
Emilio Soler, Veronika Stefanov, Jose-Norberto Maz...
APWEB
2008
Springer
14 years 11 months ago
On the Complexity of Restricted k-anonymity Problem
Abstract. One of the emerging concepts in microdata protection is kanonymity, introduced by Samarati and Sweeney. k-anonymity provides a simple and efficient approach to protect pr...
Xiaoxun Sun, Hua Wang, Jiuyong Li
RE
2002
Springer
14 years 9 months ago
Security Requirements Engineering: When Anti-Requirements Hit the Fan
Everyone agrees that security is a problem, ranging from Microsoft to the banks that have been recent victims of rogue traders. What is paradoxical is that there does not seem to ...
Robert Crook, Darrel C. Ince, Luncheng Lin, Bashar...
EUROMICRO
2009
IEEE
15 years 4 months ago
Long-Term Planning of Development Efforts by Roadmapping
—Success in the software product business requires timely release of new products and upgrades with proper quality and the right features. For this, a systematic approach for man...
Jarno Vähäniitty, Casper Lassenius, Kris...
DEBU
2006
166views more  DEBU 2006»
14 years 9 months ago
Oracle's Self-Tuning Architecture and Solutions
Performance tuning in modern database systems requires a lot of expertise, is very time consuming and often misdirected. Tuning attempts often lack a methodology that has a holist...
Benoît Dageville, Karl Dias