Sciweavers

2578 search results - page 393 / 516
» A Family-Oriented Software Development Process for Engine Co...
Sort
View
DMIN
2009
180views Data Mining» more  DMIN 2009»
15 years 1 months ago
APHID: A Practical Architecture for High-Performance, Privacy-Preserving Data Mining
While the emerging field of privacy preserving data mining (PPDM) will enable many new data mining applications, it suffers from several practical difficulties. PPDM algorithms are...
Jimmy Secretan, Anna Koufakou, Michael Georgiopoul...
SACMAT
2010
ACM
15 years 8 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
OOPSLA
2010
Springer
15 years 1 months ago
A recommender for conflict resolution support in optimistic model versioning
The usage of optimistic version control systems comes along with cumbersome and time-consuming conflict resolution in the case that the modifications of two developers are contrad...
Petra Brosch, Martina Seidl, Gerti Kappel
135
Voted
IJSSOE
2010
153views more  IJSSOE 2010»
15 years 18 days ago
SLIM: Service Location and Invocation Middleware for Mobile Wireless Sensor and Actuator Networks
One of the main obstacles to the adoption of Wireless Sensor Networks (WSNs) outside the research community is the lack of high level mechanisms to easily program them. This probl...
Gianpaolo Cugola, Alessandro Margara
IUI
1998
ACM
15 years 7 months ago
U-TEL: A Tool for Eliciting User Task Models from Domain Experts
Eliciting user-task models is a thorny problem in modelbased user interface design, and communicating domainspecific knowledge from an expert to a knowledge engineer is a continui...
R. Chung-Man Tam, David Maulsby, Angel R. Puerta