Sciweavers

1097 search results - page 173 / 220
» Model Transformations in the Development of Data-Intensive W...
Sort
View
ICETE
2004
253views Business» more  ICETE 2004»
15 years 2 months ago
BLAZE: A Mobile Agent Paradigm for VoIP Intrusion Detection Systems
ser provides abstraction for supporting flexible security policies that can be developed using the low-level primitives of the browser. We believe our browser architecture will be ...
Kapil Singh, Son T. Vuong
VLC
2008
191views more  VLC 2008»
15 years 1 months ago
Visual specification of measurements and redesigns for domain specific visual languages
Ensuring model quality is a key success factor in many computer science areas, and becomes crucial in recent software engineering paradigms like the one proposed by model-driven s...
Esther Guerra, Juan de Lara, Paloma Díaz
JAPLL
2010
179views more  JAPLL 2010»
15 years 2 hour ago
Tractable query answering and rewriting under description logic constraints
Answering queries over an incomplete database w.r.t. a set of constraints is an important computational task with applications in fields as diverse as information integration and ...
Héctor Pérez-Urbina, Boris Motik, Ia...
ENTCS
2007
101views more  ENTCS 2007»
15 years 1 months ago
Model-checking Distributed Components: The Vercors Platform
This article presents a component verification platform called Vercors providing means to analyse the behaviour properties of applications built from distributed components. From...
Tomás Barros, Antonio Cansado, Eric Madelai...
EUROSYS
2008
ACM
15 years 10 months ago
Manageable fine-grained information flow
The continuing frequency and seriousness of security incidents underlines the importance of application security. Decentralized information flow control (DIFC), a promising tool ...
Petros Efstathopoulos, Eddie Kohler