Sciweavers

2338 search results - page 149 / 468
» Using UML to model relational database operations
Sort
View
163
Voted
ICETE
2004
204views Business» more  ICETE 2004»
15 years 6 months ago
A Real-Time Intrusion Prevention System for Commercial Enterprise Databases
: - Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural ba...
Ulf T. Mattsson
139
Voted
ECAI
1990
Springer
15 years 9 months ago
Probabilistic Belief Logics
Modal logics based on Kripke style semantics are the prominent formalismin AI for modeling beliefs. Kripke semantics involve a collection of possible worlds and a relation among t...
Fahiem Bacchus
BMCBI
2007
95views more  BMCBI 2007»
15 years 5 months ago
Methods for estimating human endogenous retrovirus activities from EST databases
Background: Human endogenous retroviruses (HERVs) are surviving traces of ancient retrovirus infections and now reside within the human DNA. Recently HERV expression has been dete...
Merja Oja, Jaakko Peltonen, Jonas Blomberg, Samuel...
RE
2007
Springer
15 years 11 months ago
Goal-Oriented Conceptual Database Design
We present details of a goal-oriented process for database requirements analysis. This process consists of a number of steps, spanning the spectrum from high-level stakeholder goa...
Lei Jiang, Thodoros Topaloglou, Alexander Borgida,...
ER
2008
Springer
91views Database» more  ER 2008»
15 years 6 months ago
Location-Based Software Modeling and Analysis: Tropos-Based Approach
The continuous growth of interest in mobile applications makes the concept of location essential to design and develop software systems. Location-based software is supposed to be a...
Raian Ali, Fabiano Dalpiaz, Paolo Giorgini