Sciweavers

3330 search results - page 322 / 666
» software 2010
Sort
View
123
Voted
UTP
2010
15 years 2 months ago
Unifying Theories of Confidentiality
Abstract. This paper presents a framework for reasoning about the security of confidential data within software systems. A novelty is that we use Hoare and He's Unifying Theor...
Michael J. Banks, Jeremy L. Jacob
AISS
2010
155views more  AISS 2010»
15 years 1 months ago
An Adaptive HW/SW Dual Communication Mode
HW/SW communication mode makes significant impact on HW/SW communication efficiency. Based on the characteristics of the hardware functions, this paper presents an adaptive HW/SW ...
Wang-xian Yang, Dong-hua Liu, Ding-ju Zhu
AISS
2010
142views more  AISS 2010»
15 years 1 months ago
Service-Oriented Business-IT Alignment: A SOA Governance Model
The concept of Service Oriented Architecture (SOA) has had a significant impact not only on software engineering but on the analysis of an organization's business layer as we...
Mohammad Kazem Haki, Maia Wentland Forte
IJEB
2010
81views more  IJEB 2010»
15 years 1 months ago
Investigating the functionality and performance of online shopping bots for electronic commerce: a follow-up study
: Shopping bots are automated software applications that allow consumers to easily search for and compare product prices from online retailers. In a previous project, researchers i...
Alexander Serenko, James Hayes
134
Voted
IJEIS
2010
113views more  IJEIS 2010»
15 years 1 months ago
A Good Role Model for Ontologies: Collaborations
Abstract. Ontologies are today used to annotate web data with machine processable semantics and for domain modeling. As the use of ontologies increases and the ontologies themselve...
Michael Pradel, Jakob Henriksson, Uwe Aßmann