Sciweavers

119 search results - page 19 / 24
» The Development of a Simplified Process Model for CBSD
Sort
View
GLOBECOM
2009
IEEE
15 years 1 months ago
Anomaly-Based Identification of Large-Scale Attacks
Abstract--Large-scale attacks like Distributed Denial-ofService (DDoS) attacks still pose unpredictable threats to the Internet infrastructure and Internet-based business. Thus, ma...
Thomas Gamer
BMCBI
2011
14 years 1 months ago
PI: An open-source software package for validation of the SEQUEST result and visualization of mass spectrum
Background: Tandem mass spectrometry (MS/MS) has emerged as the leading method for high- throughput protein identification in proteomics. Recent technological breakthroughs have d...
Yantao Qiao, Hong Zhang, Dongbo Bu, Shiwei Sun
EATIS
2007
ACM
15 years 1 months ago
A model-driven approach for reusing service compositions
The web service approach provides mechanisms for simplifying application integration. However, to meaningfully facilitate scalable development and maintenance of web service appli...
Carlos Granell, Michael Gould, Dolores Marí...
IJFCS
2006
111views more  IJFCS 2006»
14 years 9 months ago
Completeness and realizability: conditions for automatic generation of workflows
In recent years, workflow technology has greatly facilitated business process modeling and reengineering in information systems. On one hand, the separation of an application'...
Shiyong Lu, Arthur J. Bernstein, Philip M. Lewis
JCP
2008
116views more  JCP 2008»
14 years 9 months ago
Formal Verification and Visualization of Security Policies
Verified and validated security policies are essential components of high assurance computer systems. The design and implementation of security policies are fundamental processes i...
Luay A. Wahsheh, Daniel Conte de Leon, Jim Alves-F...