Application recovery from network-induced data corruption
Assessing and managing operational risk in organizational...
Auditing of customs entry packets
Authenticating a site while protecting against security...
Closed-loop system management method and process capable of...
Computer-readable recording medium having recorded...
Correction server for large database systems
Data generator apparatus testing data dependent...
Delegated reference count base file versioning
Dynamic generation of XML Schema for backend driven data...
Enhanced trade compliance system: advanced shipment notice
Feedback-driven malware detector
Identifying and using critical fields in quality management
Mechanism to detect and analyze SQL injection threats
Method and system for automated request modelling
Method and system for recovering lost data volumes
Method and system of managing conflicts for a set of...
Method, system and computer program product for real-time...
Methods and systems for file replication utilizing...
Minimizing problems in accessing referred content