Pub Date : 2014-01-31DOI: 10.1524/9783110358650.101
Sai Manoj Marepalli, R. Sultana, Andreas H. Christ
{"title":"A Log-based Approach towards Enhanced Security in Cloud","authors":"Sai Manoj Marepalli, R. Sultana, Andreas H. Christ","doi":"10.1524/9783110358650.101","DOIUrl":"https://doi.org/10.1524/9783110358650.101","url":null,"abstract":"","PeriodicalId":165450,"journal":{"name":"Conference on Semantics in Text Processing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128339730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1524/9783486853162.105
K. Gurr
{"title":"Prozessdokumentation in kleinen und mittleren Unternehmen","authors":"K. Gurr","doi":"10.1524/9783486853162.105","DOIUrl":"https://doi.org/10.1524/9783486853162.105","url":null,"abstract":"","PeriodicalId":165450,"journal":{"name":"Conference on Semantics in Text Processing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124269623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1524/9783110358650.143
Denis Jurkovic, F. Kaspar
{"title":"A comparison of isolated Code execution approches for mobile devices","authors":"Denis Jurkovic, F. Kaspar","doi":"10.1524/9783110358650.143","DOIUrl":"https://doi.org/10.1524/9783110358650.143","url":null,"abstract":"","PeriodicalId":165450,"journal":{"name":"Conference on Semantics in Text Processing","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130920550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1524/9783486853162.119
Christian Weichel
We present an adaption of the self organizing map (SOM) useful for cluster analysis of large quantities of data such as music classification or customer behavior analysis. The algorithm is based on the batch SOM formulation which has been successfully adopted to other parallel architectures and perfectly suits the map reduce programming paradigm, thus enabling the use of large cloud computing infrastructures such as Amazon EC2.
{"title":"Adapting Self-Organizing Maps to the MapReduce Programming Paradigm","authors":"Christian Weichel","doi":"10.1524/9783486853162.119","DOIUrl":"https://doi.org/10.1524/9783486853162.119","url":null,"abstract":"We present an adaption of the self organizing map (SOM) useful for cluster analysis of large quantities of data such as music classification or customer behavior analysis. The algorithm is based on the batch SOM formulation which has been successfully adopted to other parallel architectures and perfectly suits the map reduce programming paradigm, thus enabling the use of large cloud computing infrastructures such as Amazon EC2.","PeriodicalId":165450,"journal":{"name":"Conference on Semantics in Text Processing","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126517763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1524/9783486853162.133
H. Staudacher, Jens Lauble
{"title":"SOAP kritisch betrachtet","authors":"H. Staudacher, Jens Lauble","doi":"10.1524/9783486853162.133","DOIUrl":"https://doi.org/10.1524/9783486853162.133","url":null,"abstract":"","PeriodicalId":165450,"journal":{"name":"Conference on Semantics in Text Processing","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121537761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1524/9783486853162.15
C. Cawley, P. Healy, Goetz Botterweck
Variability management in software intensive systems can be a complex and cognitively challenging process. Configuring a Software Product Line with thousands of variation points in order to derive a specific product variant is an example of such a challenge. Each configurable feature can have numerous relationships with many other elements within the system. These relationships can impact greatly on the overall configuration process. Understanding the nature and impact of these relationships during configuration is key to the quality and efficiency of the configuration process. In this paper we present an overview of three visual approaches to this configuration which utilise information visualisation techniques and aspects of cognitive theory to provide stakeholder support. Using an industry example, we discuss and compare the approaches using a set of fundamental configuration tasks.
{"title":"A Discussion of Three Visualisation Approaches to Providing Cognitive Support in Variability Management","authors":"C. Cawley, P. Healy, Goetz Botterweck","doi":"10.1524/9783486853162.15","DOIUrl":"https://doi.org/10.1524/9783486853162.15","url":null,"abstract":"Variability management in software intensive systems can be a complex and cognitively challenging process. Configuring a Software Product Line with thousands of variation points in order to derive a specific product variant is an example of such a challenge. Each configurable feature can have numerous relationships with many other elements within the system. These relationships can impact greatly on the overall configuration process. Understanding the nature and impact of these relationships during configuration is key to the quality and efficiency of the configuration process. In this paper we present an overview of three visual approaches to this configuration which utilise information visualisation techniques and aspects of cognitive theory to provide stakeholder support. Using an industry example, we discuss and compare the approaches using a set of fundamental configuration tasks.","PeriodicalId":165450,"journal":{"name":"Conference on Semantics in Text Processing","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133904990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1524/9783486853162.87
Martin Knobloch
{"title":"Developing Secure Web Applications with OWASP Resources","authors":"Martin Knobloch","doi":"10.1524/9783486853162.87","DOIUrl":"https://doi.org/10.1524/9783486853162.87","url":null,"abstract":"","PeriodicalId":165450,"journal":{"name":"Conference on Semantics in Text Processing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125315813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1524/9783110358650.49
B. Nopper
{"title":"Penetrationtesting mit Windows Credential Editor","authors":"B. Nopper","doi":"10.1524/9783110358650.49","DOIUrl":"https://doi.org/10.1524/9783110358650.49","url":null,"abstract":"","PeriodicalId":165450,"journal":{"name":"Conference on Semantics in Text Processing","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125878938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Datenschutz: Ein Auslaufmodell?","authors":"G. Müller","doi":"10.1524/9783110358650.3","DOIUrl":"https://doi.org/10.1524/9783110358650.3","url":null,"abstract":"","PeriodicalId":165450,"journal":{"name":"Conference on Semantics in Text Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131096971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1524/9783110358650.59
Dirk Hölscher
{"title":"An Architectural Approach For Autonomous Agents To Monitor Huge Infrastructures","authors":"Dirk Hölscher","doi":"10.1524/9783110358650.59","DOIUrl":"https://doi.org/10.1524/9783110358650.59","url":null,"abstract":"","PeriodicalId":165450,"journal":{"name":"Conference on Semantics in Text Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116838920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}