Sciweavers

1325 search results - page 197 / 265
» An Approach to Generation of Decision Rules
Sort
View
ICST
2008
IEEE
15 years 4 months ago
Model-Based Tests for Access Control Policies
We present a model-based approach to testing access control requirements. By using combinatorial testing, we first automatically generate test cases from and without access contro...
Alexander Pretschner, Tejeddine Mouelhi, Yves Le T...
DBISP2P
2005
Springer
79views Database» more  DBISP2P 2005»
15 years 3 months ago
A Gradient Topology for Master-Slave Replication in Peer-to-Peer Environments
Open peer-to-peer architectures offer many possibilities for replicating database content, but designers have to deal with problems such as peer churn rates and inherent uncertain...
Jan Sacha, Jim Dowling
ICCS
2004
Springer
15 years 3 months ago
Evaluating the Performance of Skeleton-Based High Level Parallel Programs
We show in this paper how to evaluate the performance of skeleton-based high level parallel programs. Since many applications follow some commonly used algorithmic skeletons, we id...
Anne Benoit, Murray Cole, Stephen Gilmore, Jane Hi...
ISAAC
2003
Springer
144views Algorithms» more  ISAAC 2003»
15 years 3 months ago
Biconnectivity on Symbolically Represented Graphs: A Linear Solution
Abstract. We define an algorithm for determining, in a linear number of symbolic steps, the biconnected components of a graph implicitly represented with Ordered Binary Decision D...
Raffaella Gentilini, Alberto Policriti
HICSS
2002
IEEE
125views Biometrics» more  HICSS 2002»
15 years 2 months ago
Knowledge Management Metrics via a Balanced Scorecard Methodology
IT professionals are finding that more of their IT investments are being measured against a knowledge management (KM) metric. Those who want to deploy foundation technologies such...
Alea M. Fairchild