Sciweavers

5475 search results - page 160 / 1095
» Model Driven Security
Sort
View
105
Voted
CIDR
2007
141views Algorithms» more  CIDR 2007»
15 years 2 months ago
Data-Driven Processing in Sensor Networks
Wireless sensor networks are poised to enable continuous data collection on unprecedented scales, in terms of area location and size, and frequency. This is a great boon to field...
Adam Silberstein, Gregory Filpus, Kamesh Munagala,...
119
Voted
CCS
2006
ACM
15 years 4 months ago
On the modeling and analysis of obligations
Traditional security policies largely focus on access control requirements, which specify who can access what under what circumstances. Besides access control requirements, the av...
Keith Irwin, Ting Yu, William H. Winsborough
97
Voted
EUROMICRO
2009
IEEE
15 years 8 months ago
Using Design Patterns for Refactoring Real-World Models
— Many software development methodologies are based on modeling the real world. In some of these methodologies, real-world models are gradually transformed into software models, ...
Hamed Yaghoubi Shahir, Ehsan Kouroshfar, Raman Ram...
82
Voted
CAISE
2003
Springer
15 years 6 months ago
Extending UML to Represent XML Schemas
The consolidation of the Web as one of the most important ways to share and spread information has given raise to a huge amount of information systems for this media. This is the r...
Belén Vela, Esperanza Marcos
117
Voted
ECMDAFA
2006
Springer
142views Hardware» more  ECMDAFA 2006»
15 years 4 months ago
Constraint Support in MDA Tools: A Survey
: The growing interest in the MDA (Model-Driven Architecture) and MDD (Model-Driven Development) approaches has largely increased the number of tools and methods including code-gen...
Jordi Cabot, Ernest Teniente