Sciweavers

6530 search results - page 1063 / 1306
» Application Integration
Sort
View
SP
1999
IEEE
145views Security Privacy» more  SP 1999»
15 years 8 months ago
A User-Centered, Modular Authorization Service Built on an RBAC Foundation
Psychological acceptability has been mentioned as a requirement for secure systems for as long as least privilege and fail safe defaults, but until now has been all but ignored in...
Mary Ellen Zurko, Richard Simon, Tom Sanfilippo
CODES
1998
IEEE
15 years 8 months ago
Software timing analysis using HW/SW cosimulation and instruction set simulator
Timing analysis for checking satisfaction of constraints is a crucial problem in real-time system design. In some current approaches, the delay of software modules is precalculate...
Jie Liu, Marcello Lajolo, Alberto L. Sangiovanni-V...
VISUAL
1999
Springer
15 years 8 months ago
Genetic Algorithm for Weights Assignment in Dissimilarity Function for Trademark Retrieval
Abstract. Trademark image retrieval is becoming an important application for logo registry, veri cation, and design. There are two major problems about the current approaches to tr...
David Yuk-Ming Chan, Irwin King
VLDB
1999
ACM
188views Database» more  VLDB 1999»
15 years 8 months ago
SPIRIT: Sequential Pattern Mining with Regular Expression Constraints
Discovering sequential patterns is an important problem in data mining with a host of application domains including medicine, telecommunications, and the World Wide Web. Conventio...
Minos N. Garofalakis, Rajeev Rastogi, Kyuseok Shim
TPHOL
1998
IEEE
15 years 8 months ago
The Village Telephone System: A Case Study in Formal Software Engineering
In this paper we illustrate the use of formal methods in the development of a benchmark application we call the Village Telephone System which is characteristic of a class of netwo...
Karthikeyan Bhargavan, Carl A. Gunter, Elsa L. Gun...
« Prev « First page 1063 / 1306 Last » Next »