Sciweavers

5312 search results - page 993 / 1063
» Business Process Management Systems
Sort
View
ACSAC
2005
IEEE
15 years 5 months ago
Intrusion Detection in RBAC-administered Databases
A considerable effort has been recently devoted to the development of Database Management Systems (DBMS) which guarantee high assurance security and privacy. An important componen...
Elisa Bertino, Ashish Kamra, Evimaria Terzi, Athen...
ICSM
2005
IEEE
15 years 5 months ago
A Safe Regression Test Selection Technique for Database-Driven Applications
Regression testing is a widely-used method for checking whether modifications to software systems have adversely affected the overall functionality. This is potentially an expens...
David Willmor, Suzanne M. Embury
EICS
2009
ACM
15 years 4 months ago
Adapting ubicomp software and its evaluation
We describe work in progress on tools and infrastructure to support adaptive component-based software for mobile devices— in our case, Apple iPhones. Our high level aim is ‘de...
Malcolm Hall, Marek Bell, Alistair Morrison, Stuar...
138
Voted
SIGADA
2001
Springer
15 years 4 months ago
Electronic maneuvering board and dead reckoning tracer decision aid for the officer of the deck
Statement and AbstractProblem Statement and AbstractProblem Statement and AbstractProblem Statement and Abstract The U.S. Navy currently bases the majority of our contact managemen...
Kenneth L. Ehresman, Joey L. Frantzen
KDD
2010
ACM
259views Data Mining» more  KDD 2010»
15 years 3 months ago
A probabilistic model for personalized tag prediction
Social tagging systems have become increasingly popular for sharing and organizing web resources. Tag recommendation is a common feature of social tagging systems. Social tagging ...
Dawei Yin, Zhenzhen Xue, Liangjie Hong, Brian D. D...