Sciweavers

2236 search results - page 311 / 448
» Secure Software Design in Practice
Sort
View
EDBT
2010
ACM
181views Database» more  EDBT 2010»
14 years 8 months ago
Private record matching using differential privacy
Private matching between datasets owned by distinct parties is a challenging problem with several applications. Private matching allows two parties to identify the records that ar...
Ali Inan, Murat Kantarcioglu, Gabriel Ghinita, Eli...
EDBTW
2010
Springer
15 years 3 months ago
ODBIS: towards a platform for on-demand business intelligence services
In recent years, Software-as-a-Service (SaaS) is gaining momentum with more and more successful adoptions. Several companies including some well known names have embraced this new...
Moez Essaidi
SIGSOFT
2005
ACM
15 years 3 months ago
Detecting higher-level similarity patterns in programs
Cloning in software systems is known to create problems during software maintenance. Several techniques have been proposed to detect the same or similar code fragments in software...
Hamid Abdul Basit, Stan Jarzabek
CODES
2006
IEEE
15 years 4 months ago
Thermal-aware high-level synthesis based on network flow method
Lowering down the chip temperature is becoming one of the important design considerations, since temperature adversely and seriously affects many of design qualities, such as reli...
Pilok Lim, Taewhan Kim
JOT
2008
124views more  JOT 2008»
14 years 10 months ago
Methodological Proposal for Business Process Management sustained in the use of Patterns
At the moment, enterprises require complex business models with an organizational structures, processes and systems that must be explicitly designed. The work designed by these bu...
Pedro Bonillo, Nancy Zambrano, Alecia Eleonora Aco...