Sciweavers

208 search results - page 32 / 42
» Consistency Checking for Component Reuse in Open Systems
Sort
View
CSREASAM
2006
15 years 1 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
IPPS
2009
IEEE
15 years 6 months ago
DMTCP: Transparent checkpointing for cluster computations and the desktop
DMTCP (Distributed MultiThreaded CheckPointing) is a transparent user-level checkpointing package for distributed applications. Checkpointing and restart is demonstrated for a wid...
Jason Ansel, Kapil Arya, Gene Cooperman
HT
1997
ACM
15 years 3 months ago
Supporting User-defined Activity Spaces
Activity spaces are usually task-specific and only common to a group of people who work together in a certain application domain. It is desirable to enable users to define and mod...
Weigang Wang, Jörg M. Haake
CI
1999
90views more  CI 1999»
14 years 11 months ago
Efficient Implementation of Semantic Relations in Lexical Databases
In this paper we develop a formalization of semantic relations that facilitates efficient implementations of relations in lexical databases or knowledge representation systems usi...
Uta Priss
ICWE
2005
Springer
15 years 5 months ago
Modelling the Behaviour of Web Applications with ArgoUWE
A methodology needs to be empowered by appropriate tool support. The CASE tool ArgoUWE supports designers in the use of the UWE methodology for the systematic, UML-based developmen...
Alexander Knapp, Nora Koch, Gefei Zhang