Sciweavers

109 search results - page 20 / 22
» Legacy Software Evaluation Model for Outsourced Maintainer
Sort
View
UIST
2003
ACM
13 years 10 months ago
Perceptually-supported image editing of text and graphics
This paper presents a novel image editing program emphasizing easy selection and manipulation of material found in informal, casual documentssuch as sketches, handwrittennotes, wh...
Eric Saund, David J. Fleet, Daniel Larner, James M...
ECIS
2004
13 years 7 months ago
Security and privacy in a structured information network
The lack of trust amongst consumers and concerns about disclosing personal information are commonly seen as a major impediment to the growth of e-commerce. This is a consequence o...
Tuomas Valtonen, Tero Reuna, Kalle Luhtinen
EJC
2010
13 years 11 days ago
Inferencing in Database Semantics
As a computational model of natural language communication, Database Semantics1 (DBS) includes a hearer mode and a speaker mode. For the content to be mapped into language expressi...
Roland Hausser
ATAL
2011
Springer
12 years 5 months ago
Information-driven interaction-oriented programming: BSPL, the blindingly simple protocol language
We present a novel approach to interaction-oriented programming based on declaratively representing communication protocols. Our approach exhibits the following distinguishing fea...
Munindar P. Singh
CCS
2007
ACM
13 years 11 months ago
Managing RBAC states with transitive relations
In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...
Chaoyi Pang, David P. Hansen, Anthony J. Maeder