Sciweavers

635 search results - page 114 / 127
» Managing the Evolution of Service Specifications
Sort
View
EDOC
2003
IEEE
15 years 3 months ago
Model Driven Security: Unification of Authorization Models for Fine-Grain Access Control
The research vision of the Unified Component Meta Model Framework (UniFrame) is to develop an infrastructure for components that enables a plug and play component environment wher...
Carol C. Burt, Barrett R. Bryant, Rajeev R. Raje, ...
HICSS
2002
IEEE
101views Biometrics» more  HICSS 2002»
15 years 2 months ago
Launching Multi-modal Interaction on an EC-Site
In this paper we address the weaknesses of current EC applications related to their lack of support for the customer to recognize other people, either other customers or vendors o...
Samuli Pekkola, Jukka Heikkilä, Virpi Kristii...
JCDL
2009
ACM
103views Education» more  JCDL 2009»
15 years 2 months ago
Query parameters for harvesting digital video and associated contextual information
Video is increasingly important to digital libraries and archives as both primary content and as context for the primary objects in collections. Services like YouTube not only off...
Gary Marchionini, Chirag Shah, Christopher A. Lee,...
ACSAC
1999
IEEE
15 years 2 months ago
Secure Communications in ATM Networks
The ATM Forum international consortium recently approved the first version of its security specifications aiming to protect communications over Asynchronous Transfer Mode (ATM) ne...
Maryline Laurent, Ahmed Bouabdallah, Christophe De...
RTAS
1999
IEEE
15 years 2 months ago
MIRROR: A State-Conscious Concurrency Control Protocol for Replicated Real-Time Databases
Data replication can help database systems meet the stringent temporal constraints of current time-critical applications, especially Internet-based services. A prerequisite, howev...
Ming Xiong, Krithi Ramamritham, Jayant R. Haritsa,...