Sciweavers

1049 search results - page 122 / 210
» Change Management in Large-Scale Enterprise Information Syst...
Sort
View
SIGMOD
2010
ACM
598views Database» more  SIGMOD 2010»
15 years 6 months ago
Ricardo: integrating R and Hadoop
Many modern enterprises are collecting data at the most detailed level possible, creating data repositories ranging from terabytes to petabytes in size. The ability to apply sophi...
Sudipto Das, Yannis Sismanis, Kevin S. Beyer, Rain...
SACMAT
2011
ACM
14 years 4 months ago
xDAuth: a scalable and lightweight framework for cross domain access control and delegation
Cross domain resource sharing and collaborations have become pervasive in today’s service oriented organizations. Existing approaches for the realization of cross domain access ...
Masoom Alam, Xinwen Zhang, Kamran Khan, Gohar Ali
COMPSAC
2002
IEEE
15 years 6 months ago
Renaissance: A Method to Support Software System Evolution
Legacy systems are often business critical and are associated with high maintenance costs. In this paper, we present an overview of a method, Renaissance, which aims to manage the...
Ian Warren, Jane Ransom
IJNSEC
2006
112views more  IJNSEC 2006»
15 years 1 months ago
An Access Control System with Time-constraint Using Support Vector Machines
Access control is an important issue in information security. It is a necessary mechanism for protecting data in a computer system. In this paper, we apply support vector machines...
Chin-Chen Chang, Iuon-Chang Lin, Chia-Te Liao
ICSE
1999
IEEE-ACM
15 years 6 months ago
Exploiting Smalltalk Modules in a Customizable Programming Environment
This paper describes how we have extended a module structure of the Smalltalk LearningWorks to provide a programming environment deigned for very large scale technology transfer. ...
Mark Woodman, Robert Griffiths, Malcolm Macgregor,...