Sciweavers

11066 search results - page 2181 / 2214
» Linearity in Process Languages
Sort
View
SACMAT
2010
ACM
15 years 2 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
ERCIMDL
2009
Springer
177views Education» more  ERCIMDL 2009»
15 years 2 months ago
Curated Databases
Curated databases are databases that are populated and updated with a great deal of human effort. Most reference works that one traditionally found on the reference shelves of li...
Peter Buneman
APN
2001
Springer
15 years 2 months ago
Rewriting Logic as a Unifying Framework for Petri Nets
We propose rewriting logic as a unifying framework for a wide range of Petri nets models. We treat in detail place/transition nets and important extensions of the basic model by in...
Mark-Oliver Stehr, José Meseguer, Peter Csa...
OOPSLA
2001
Springer
15 years 2 months ago
Regression Test Selection for Java Software
Regression testing is applied to modified software to provide confidence that the changed parts behave as intended and that the unchanged parts have not been adversely affected ...
Mary Jean Harrold, James A. Jones, Tongyu Li, Dong...
ICEIS
2000
IEEE
15 years 2 months ago
University Information System Fully Based on WWW
This paper describes the development of Information System (IS) at Masaryk University in Brno. It supports full range of administrative and information functions in the study area,...
Jan Pazdziora, Michal Brandejs
« Prev « First page 2181 / 2214 Last » Next »