Sciweavers

1989 search results - page 256 / 398
» Integrity Management in Component Based Systems
Sort
View
DAC
2009
ACM
15 years 11 months ago
Information hiding for trusted system design
For a computing system to be trusted, it is equally important to verify that the system performs no more and no less functionalities than desired. Traditional testing and verifica...
Junjun Gu, Gang Qu, Qiang Zhou
SACMAT
2003
ACM
15 years 10 months ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf
SIGMOD
2011
ACM
176views Database» more  SIGMOD 2011»
14 years 7 months ago
Sharing work in keyword search over databases
An important means of allowing non-expert end-users to pose ad hoc queries — whether over single databases or data integration systems — is through keyword search. Given a set...
Marie Jacob, Zachary G. Ives
WEBNET
2001
15 years 6 months ago
An Adaptive Hypermedia Presentation Modeling System for Custom Knowledge Representations
We propose a generic presentation system for adaptive educational hypermedia that is highly independent from domain knowledge representation and application state management. Our a...
Pablo Castells, José Antonio Macías ...
ICCAD
2004
IEEE
118views Hardware» more  ICCAD 2004»
16 years 1 months ago
Optimizing mode transition sequences in idle intervals for component-level and system-level energy minimization
New embedded systems offer rich power management features in the form of multiple operational and non-operational power modes. While they offer mechanisms for better energy effic...
Jinfeng Liu, Pai H. Chou