Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,217,325 papers from all fields of science
Search
Sign In
Create Free Account
PTC Integrity
Known as:
MKS Integrity
, MKS (software)
, MKS Source
Expand
PTC Integrity (formerly MKS Integrity) is a software system lifecycle management (SSLM) and application lifecycle management (ALM) platform developed…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
17 relations
Agile software development
Apache Maven
Application lifecycle management
Change management (engineering)
Expand
Broader (1)
Software project management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
SPS: Secure personal health information sharing with patient-centric access control in cloud computing
Mrinmoy Barua
,
R. Lu
,
Xuemin Shen
Global Communications Conference
2013
Corpus ID: 20858929
In this paper, we propose a patient-centric personal health information (PHI) sharing and access control scheme, SPS. Proposed…
Expand
Highly Cited
2010
Highly Cited
2010
Uni and Epig
Erika
,
Kokic
,
+9 authors
G. Liang
2010
Corpus ID: 207635530
nloaded thelial cancer (UC) develops along two different genetic pathways, resulting in noninvasive or invamors. However, it is…
Expand
Highly Cited
2010
Highly Cited
2010
Assessment of Commercial Network RTK User Positioning Performance over Long Inter-Station Distances
Charles Wang
,
Yanming Feng
,
M. Higgins
,
Ben Cowie
2010
Corpus ID: 111522987
The paper provides an assessment of the performance of commercial Real Time Kinematic (RTK) systems over longer than recommended…
Expand
Highly Cited
2007
Highly Cited
2007
β-Sheet Structured β-Amyloid(1-40) Perturbs Phosphatidylcholine Model Membranes
M. D. Planque
,
V. Raussens
,
+6 authors
A. Watts
2007
Corpus ID: 51739235
2007
2007
Reconceptualizing a Family of Heterogeneous Embedded Systems via Explicit Architectural Support
S. Malek
,
Chiyoung Seo
,
Sharmila Ravula
,
Brad Petrus
,
N. Medvidović
International Conference on Software Engineering
2007
Corpus ID: 6300065
It has been widely advocated that software architecture provides an effective set of abstractions for engineering (families of…
Expand
1999
1999
Lek Site Selection by Male Mediterranean Fruit Flies
R. Kaspi
,
B. Yuval
Journal of insect behavior
1999
Corpus ID: 37696729
The mating system of the Mediterranean fruit fly, Ceratitis capitata (Wiedemann), is based on leks. In field cage choice…
Expand
Highly Cited
1992
Highly Cited
1992
Dependence of plasma-induced oxide charging current on Al antenna geometry
H. Shin
,
C. Hu
IEEE Electron Device Letters
1992
Corpus ID: 40302564
The dependence of the plasma-induced oxide charging current on Al electrode geometry has been studied. The stress current is…
Expand
Highly Cited
1990
Highly Cited
1990
The boundary between morphology and syntax : separable complex verbs in Dutch
G. Booij
1990
Corpus ID: 56092029
This formulation of the Principle of Lexical Integrity does not exclude all types of interaction between morphology and syntax…
Expand
1990
1990
Negations of Transactions and Their Use in the Specification of Dynamic and Deontic Integrity Constraints
F. Dignum
,
J. Meyer
1990
Corpus ID: 58396708
We introduce the negations of transactions in the sense of nonperformance as an ingredient of a specification language for…
Expand
Highly Cited
1975
Highly Cited
1975
Some cryptographic techniques for machine-to-machine data communications
Horst Feistel
,
W. Notz
,
J. L. Smith
Proceedings of the IEEE
1975
Corpus ID: 2958540
Some of the threats to the integrity of multiuser teleprocessing systems and to the data they contain can be countered by the use…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE