Sciweavers

637 search results - page 62 / 128
» Inconsistency-Tolerant Integrity Checking
Sort
View
91
Voted
IEEEARES
2006
IEEE
15 years 9 months ago
Availability Constraints for Avionic Data Buses
— The three traditional objectives of computer security are confidentiality, integrity and availability [8]. Availability can be defined as the prevention of denial of service. C...
Alban Gabillon, Laurent Gallon
118
Voted
ECAI
2000
Springer
15 years 8 months ago
Extensions of Constraint Solving for Proof Planning
The integration of constraint solvers into proof planning has pushed the problem solving horizon. Proof planning benefits from the general functionalities of a constraint solver s...
Erica Melis, Jürgen Zimmer, Tobias Mülle...
112
Voted
OOIS
1997
Springer
15 years 7 months ago
CORBA and ODBMSs in Viewpoint Development Environment Architectures
Viewpoints are re ections of software systems from multiple perspectives. A number of consistency conditions apply to viewpoints and developers require a tool for each type of vie...
Wolfgang Emmerich
126
Voted
OOPSLA
1992
Springer
15 years 7 months ago
CACL: Efficient Fine-Grained Protection for Objects
CACL is a protection scheme for objects that offers a simple and flexible model of protection and has an efficient, software-only implementation. The model, based on Access Contro...
Joel E. Richardson, Peter M. Schwarz, Luis-Felipe ...
146
Voted
WSC
2007
15 years 6 months ago
Composing simulation models using interface definitions based on web service descriptions
Using models in different contexts poses major integration challenges, ranging from technical to conceptual levels. Independently of each other developed model components cannot b...
Mathias Röhl, Stefan Morgenstern