Sciweavers

4702 search results - page 218 / 941
» How to Copyright a Function
Sort
View
CCS
2003
ACM
15 years 10 months ago
Formal access control analysis in the software development process
Security is a crucial aspect in any modern software system. To ensure security in the final product, security requirements must be considered in the entire software development p...
Manuel Koch, Francesco Parisi-Presicce
ESORICS
2003
Springer
15 years 10 months ago
Hardware Encapsulation of Security Services
Hardware security modules can be used to encapsulate simple security services that bind security functions such as decryption with authorisation and authentication. Such hardware ...
Adrian Baldwin, Simon Shiu
VISUALIZATION
1998
IEEE
15 years 9 months ago
Visualization for multiparameter aircraft designs
We describe an aircraft design problem in high dimensional space, with D typically being 10 to 30. In some respects this is a classic optimization problem, where the goal is to fi...
Clifford A. Shaffer, Duane L. Knill, Layne T. Wats...
SAS
1993
Springer
139views Formal Methods» more  SAS 1993»
15 years 9 months ago
Compiling FX on the CM-2
Type and effect systems provide a safe and effective means of programming high-performance parallel computers with a high-level language that integrates both functional and impe...
Jean-Pierre Talpin, Pierre Jouvelot
ADBIS
2010
Springer
136views Database» more  ADBIS 2010»
15 years 6 months ago
New Frontiers in Business Intelligence: Distribution and Personalization
Abstract. To meet the new, more sophisticated needs of decision makers, a new generation of BI systems is emerging. In this paper we focus on two enabling technologies for this new...
Stefano Rizzi