Sciweavers

1530 search results - page 192 / 306
» Design and Implementation of a Key-Lifecycle Management Syst...
Sort
View
ACSAC
2007
IEEE
15 years 10 months ago
Centralized Security Labels in Decentralized P2P Networks
This paper describes the design of a peer-to-peer network that supports integrity and confidentiality labeling of shared data. A notion of data ownership privacy is also enforced...
Nathalie Tsybulnik, Kevin W. Hamlen, Bhavani M. Th...
93
Voted
ICSM
2005
IEEE
15 years 9 months ago
Isolating Idiomatic Crosscutting Concerns
This paper reports on our experience in automatically migrating the crosscutting concerns of a large-scale software system, written in C, to an aspect-oriented implementation. We ...
Magiel Bruntink, Arie van Deursen, Tom Tourw&eacut...
ER
2004
Springer
93views Database» more  ER 2004»
15 years 9 months ago
Schema Versioning in Data Warehouses
Abstract. As several mature implementations of data warehousing systems are fully operational, a crucial role in preserving their up-to-dateness is played by the ability to manage ...
Matteo Golfarelli, Jens Lechtenbörger, Stefan...
115
Voted
DATE
1999
IEEE
95views Hardware» more  DATE 1999»
15 years 7 months ago
Object-Oriented Reuse Methodology for VHDL
In the reuse domain, the necessity of finding a new, more suitable description language opposes the need to make reuse an accepted practice, and thus related to standards. This pa...
Cristina Barna, Wolfgang Rosenstiel
116
Voted
CIKM
1999
Springer
15 years 7 months ago
Training a Selection Function for Extraction
In this paper we compare performance of several heuristics in generating informative generic/query-oriented extracts for newspaper articles in order to learn how topic prominence ...
Chin-Yew Lin