Sciweavers

376 search results - page 69 / 76
» Integrity constraints in trust management
Sort
View
IH
1998
Springer
15 years 3 months ago
Fingerprinting Digital Circuits on Programmable Hardware
Advanced CAD tools and high-density VLSI technologies have combined to create a new market for reusable digital designs. The economic viability of the new core-based design paradig...
John Lach, William H. Mangione-Smith, Miodrag Potk...
CIT
2007
Springer
15 years 3 months ago
An Aspect Enhanced Method of NFR Modeling in Software Architecture
Existence of crosscutting concerns in software requirements often intensifies complexity of software development. Modeling and analysis of these concerns at software architecture ...
Hamid Bagheri, Seyed-Hassan Mirian-Hosseinabadi, H...
VRML
2010
ACM
14 years 12 months ago
Remote scientific visualization of progressive 3D meshes with X3D
This paper presents a framework, integrated into the X3D file format, for the streaming of 3D content in the context of remote scientific visualization; a progressive mesh compres...
Adrien Maglo, Ho Lee, Guillaume Lavoué, Chr...
106
Voted
DAWAK
2009
Springer
14 years 9 months ago
Towards a Modernization Process for Secure Data Warehouses
Data Warehouses (DW) manage crucial enterprise information used for the decision making process which has to be protected from unauthorized accesses. However, security constraints ...
Carlos Blanco, Ricardo Pérez-Castillo, Arnu...
PVLDB
2010
342views more  PVLDB 2010»
14 years 10 months ago
CRIUS: User-Friendly Database Design
Non-technical users are increasingly adding structures to their data. This gives rise to the need for database design. However, traditional database design is deliberate and heavy...
Li Qian, Kristen LeFevre, H. V. Jagadish