SCEPYLT: An Information System for Fighting Terrorism
暂无分享,去创建一个
[1] Steven D. Gribble,et al. Presence-based availability and P2P systems , 2005, Fifth IEEE International Conference on Peer-to-Peer Computing (P2P'05).
[2] Batya Friedman,et al. Trust online , 2000, CACM.
[3] Miroslaw Malek,et al. Current solutions for Web service composition , 2004, IEEE Internet Computing.
[4] Carl E. Landwehr,et al. Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.
[5] Pradeep K. Khosla,et al. Survivable Information Storage Systems , 2000, Computer.
[6] John C. Knight,et al. Safety critical systems: challenges and directions , 2002, Proceedings of the 24th International Conference on Software Engineering. ICSE 2002.
[7] Vivek R. Narasayya,et al. Integrating vertical and horizontal partitioning into automated physical database design , 2004, SIGMOD '04.
[8] Chris Clifton,et al. Privacy-preserving distributed mining of association rules on horizontally partitioned data , 2004, IEEE Transactions on Knowledge and Data Engineering.
[9] Paolo Traverso,et al. Service-Oriented Computing: State of the Art and Research Challenges , 2007, Computer.
[10] KantarciogluMurat,et al. Privacy-Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data , 2004 .
[11] William R. Dunn. Designing Safety-Critical Computer Systems , 2003, Computer.