Sciweavers

2562 search results - page 157 / 513
» The Use of B2B Process Standards: A Case Study
Sort
View
INFSOF
2007
83views more  INFSOF 2007»
14 years 10 months ago
On the design of more secure software-intensive systems by use of attack patterns
Retrofitting security implementations to a released software-intensive system or to a system under development may require significant architectural or coding changes. These late...
Michael Gegick, Laurie Williams
ICDE
2006
IEEE
127views Database» more  ICDE 2006»
15 years 4 months ago
Processing Recursive XQuery over XML Streams: The Raindrop Approach
— XML stream applications bring the challenge of efficiently processing queries on sequentially accessible tokenbased data. For efficient processing of queries, we need to ensu...
Mingzhu Wei, Ming Li, Elke A. Rundensteiner, Mural...
COREGRID
2007
Springer
15 years 4 months ago
Simplifying Grid Application Programming Using Web-Enabled Code Transfer Tools
This paper deals with one of the fundamental properties of grid computing – transferring code between grid nodes and executing it remotely on heterogeneous hosts. Contemporary mi...
Catalin Dumitrescu, Jan Dünnweber, Philipp L&...
RE
2006
Springer
14 years 10 months ago
Using trust assumptions with security requirements
Assumptions are frequently made during requirements analysis of a system about the trustworthiness of its various components (including human components). These trust assumptions, ...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...
FIW
2007
133views Communications» more  FIW 2007»
14 years 11 months ago
Conflict Detection in Call Control Using First-Order Logic Model Checking
Feature interaction detection methods, whether online or offline, depend on previous knowledge of conflicts between the actions executed by the features. This knowledge is usually ...
Ahmed F. Layouni, Luigi Logrippo, Kenneth J. Turne...