Sciweavers

706 search results - page 78 / 142
» Clone-Aware Configuration Management
Sort
View
CCS
2008
ACM
15 years 7 months ago
A formal framework for reflective database access control policies
Reflective Database Access Control (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege contained in an acce...
Lars E. Olson, Carl A. Gunter, P. Madhusudan
IESA
2007
15 years 6 months ago
A Security Framework for Smart Ubiquitous Industrial Resources
Conventional approaches to manage and control security seem to have reached their limits in new complex environments. These environments are open, dynamic, heterogeneous, distribut...
Anton Naumenko, Artem Katasonov, Vagan Y. Terziyan
IIWAS
2008
15 years 6 months ago
Supporting mobile payment QOS by data mining GSM network traffic
In mobile commerce, short-message-service (SMS) is an important technique for delivering payment instruction. A payment model "SMS Credit" was proposed earlier [1]. Such...
Edison Lai, Simon Fong, Yang Hang
LREC
2008
130views Education» more  LREC 2008»
15 years 6 months ago
COLDIC, a Lexicographic Platform for LMF compliant lexica
Despite of the importance of lexical resources for a number of NLP applications (Machine Translation, Information Extraction, Event Detection and Tracking, Question Answering, amo...
Núria Bel, Sergio Espeja, Montserrat Marimo...
SPLC
2004
15 years 6 months ago
Generalized Release Planning for Product Line Architectures
This paper elaborates on the coordination and management of evolving software product-lines, where development teams work around a shared and reusable domain infrastructure. The tr...
Louis J. M. Taborda