Sciweavers

SAC
2008
ACM
13 years 4 months ago
Towards self-configuration and management of e-service provisioning in dynamic value constellations
Networked value constellations are collections of enterprises that jointly satify complex consumer needs. Increasingly, such needs are satisfied by e-services, i.e. commercial ser...
Jaap Gordijn, Hans Weigand, Manfred Reichert, Roel...
SAC
2008
ACM
13 years 4 months ago
Adding background knowledge to formal concept analysis via attribute dependency formulas
We present a way to add user's background knowledge to formal concept analysis. The type of background knowledge we deal with relates to relative importance of attributes in ...
Radim Belohlávek, Vilém Vychodil
SAC
2008
ACM
13 years 4 months ago
A pull-based e-mail architecture
Conventional e-mail systems are prone to problems that impact their scalability and dependability. E-mail systems operate following a "push-based" approach: the sender s...
Edson Kageyama, Carlos Maziero, Altair Olivo Santi...
SAC
2008
ACM
13 years 4 months ago
A cost-driven approach to role engineering
In recent years role-based access control (RBAC) has been spreading within organizations. However, companies still have considerable difficulty migrating to this model, due to the...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
SAC
2008
ACM
13 years 4 months ago
The volume in focus: hardware-assisted focus and context effects for volume visualization
In many volume visualization applications there is some region of specific interest where we wish to see fine detail - yet we do not want to lose an impression of the overall pict...
Marcelo Cohen, Ken W. Brodlie, Nick Phillips
SAC
2008
ACM
13 years 4 months ago
SPEM on test: the SODA case study
Elena Nardini, Ambra Molesini, Andrea Omicini, Enr...
SAC
2008
ACM
13 years 4 months ago
Digital audio watermarking evaluation within the application field of perceptual hashing
Digital watermarking is a growing research area to mark digital content by embedding information into the content itself. Perceptual hashing is used to identify a specific content...
Andreas Lang, Jana Dittmann
SAC
2008
ACM
13 years 4 months ago
Contextualizing normative open multi-agent systems
Open MASs can be extremely dynamic due to heterogeneous agents that migrate among them to obtain resources or services not found locally. In order to prevent malicious actions and...
Carolina Howard Felicíssimo, Caroline Chopi...
SAC
2008
ACM
13 years 4 months ago
UML-based design test generation
In this paper we investigate and propose a fully automated technique to perform conformance checking of Java implementations against UML class diagrams. In our approach, we reused...
Waldemar Pires, João Brunet, Franklin Ramal...