Sciweavers

955 search results - page 135 / 191
» Model Checking Operator Procedures
Sort
View
104
Voted
ACISP
2008
Springer
15 years 7 months ago
Advanced Permission-Role Relationship in Role-Based Access Control
Abstract. Permission-role assignment is an important issue in rolebased access control (RBAC). There are two types of problems that may arise in permission-role assignment. One is ...
Min Li, Hua Wang, Ashley W. Plank, Jianming Yong
91
Voted
CAISE
2003
Springer
15 years 6 months ago
Process-aware Authoring of Web-based Educational Systems
In this paper we discuss how the concept of ontology can be beneficial for the authoring support of Web-based educational systems (WBES). We take a semantic perspective on the know...
Lora Aroyo, Riichiro Mizoguchi
110
Voted
JMS
2010
109views more  JMS 2010»
14 years 7 months ago
Newborn Screening Healthcare Information System Based on Service-Oriented Architecture
In this paper, we established a newborn screening system under the HL7/Web Services frameworks. We rebuilt the NTUH Newborn Screening Laboratory's original standalone architec...
Sung-huai Hsieh, Sheau-Ling Hsieh, Yin-Hsiu Chien,...
DAC
2007
ACM
16 years 1 months ago
A System For Coarse Grained Memory Protection In Tiny Embedded Processors
Many embedded systems contain resource constrained microcontrollers where applications, operating system components and device drivers reside within a single address space with no...
Ram Kumar, Akhilesh Singhania, Andrew Castner, Edd...
110
Voted
MOBIHOC
2005
ACM
16 years 8 days ago
The feasibility of launching and detecting jamming attacks in wireless networks
Wireless networks are built upon a shared medium that makes it easy for adversaries to launch jamming-style attacks. These attacks can be easily accomplished by an adversary emitt...
Wenyuan Xu, Wade Trappe, Yanyong Zhang, Timothy Wo...