Sciweavers

5457 search results - page 264 / 1092
» Software Component Independence
Sort
View
156
Voted
ACSAC
1999
IEEE
15 years 9 months ago
Adding Availability to Log Services of Untrusted Machines
Uncorrupted log files are the critical system component for computer forensics in case of intrusion and for real time system monitoring and auditing. Protection from tampering wit...
Arianna Arona, Danilo Bruschi, Emilia Rosti
BILDMED
2006
135views Algorithms» more  BILDMED 2006»
15 years 6 months ago
Restoration of the Sphere-Cortex Homeomorphism
Abstract. The proposed algorithm has been developed as a pre-processing tool for inflating cortical surface meshes, which have been created using segmentation and subsequent triang...
Andreas Mang, Michael Wagner 0002, Jan Müller...
CRIWG
2004
15 years 6 months ago
Ariane: An Awareness Mechanism for Shared Databases
Awareness is an essential requirement in collaborative activities. This paper presents Ariane, a generic and reusable awareness infrastructure, independent of a specific applicatio...
Vaninha Vieira, Marco A. S. Mangan, Cláudia...
PDPTA
2010
15 years 2 months ago
Enhancing the Discovery of Web Services: A Keyword-oriented Multiontology Reconciliation
Abstract-- The success of Web Services as a tool to decouple and distribute different processes is beyond any doubt. On the one hand, their distributed nature makes them perfect to...
Carlos Bobed, Eduardo Mena
ISESE
2005
IEEE
15 years 10 months ago
Contextual reusability metrics for event-based architectures
Component Based Software Engineering has been perceived to have immense reuse potential. This area has evoked wide interest and has led to considerable investment in research and ...
Sutirtha Bhattacharya, Dewayne E. Perry