Sciweavers

4190 search results - page 681 / 838
» Implementing commitment-based interactions
Sort
View
143
Voted
DBSEC
2001
129views Database» more  DBSEC 2001»
15 years 4 months ago
Secure Role-Based Workflow Models
: In this paper we introduce a series of reference models for Secure Role-Based Workflow systems. We build our models over the well-known RBAC96 framework. 96 model supports the no...
Savith Kandala, Ravi S. Sandhu
DOA
2001
132views more  DOA 2001»
15 years 4 months ago
Mobile RMI: Supporting Remote Access to Java Server Objects on Mobile Hosts
Java Remote Method Invocation (RMI) is a specification for building distributed object-oriented applications. RMI was designed primarily for use in conventional, wired computing e...
Tom Wall, Vinny Cahill
123
Voted
IFIP13
2004
15 years 4 months ago
Analysing Dynamic Function Scheduling Decisions
: Function allocation, as a process used in the construction of dependable complex systems, is a significant aspect of the design and implementation of interactive systems. It invo...
Karsten Loer, Michael Hildebrandt, Michael D. Harr...
111
Voted
FLAIRS
2001
15 years 4 months ago
An Intelligent Interface for Keyboard and Mouse Control -- Providing Full Access to PC Functionality via Speech
SUITEKeys is a speech user interface for motor-disabled computer users. This interface provides access to all available functionality of a computer by modeling interaction at the ...
Bill Z. Manaris, Renée A. McCauley, Valanne...
128
Voted
FORTE
2001
15 years 4 months ago
Stepwise Design with Message Sequence Charts
Use cases are useful in various stages of the software process. They are very often described using text that has to be interpreted by system designers. This could lead to implemen...
Ferhat Khendek, Stephan Bourduas, Daniel Vincent