Sciweavers

3971 search results - page 669 / 795
» On the Use of Properties in Java Applications
Sort
View
SACMAT
2010
ACM
15 years 9 months ago
An access control model for mobile physical objects
Access to distributed databases containing tuples collected about mobile physical objects requires information about the objects’ trajectories. Existing access control models ca...
Florian Kerschbaum
ESA
2009
Springer
167views Algorithms» more  ESA 2009»
15 years 9 months ago
Clustering-Based Bidding Languages for Sponsored Search
Sponsored search auctions provide a marketplace where advertisers can bid for millions of advertising opportunities to promote their products. The main difficulty facing the adver...
Mohammad Mahdian, Grant Wang
ACSAC
2000
IEEE
15 years 9 months ago
History-based Distributed Filtering - A Tagging Approach to Network-Level Access Control
This contribution discusses a network-level access control technique that applies the non-discretionary access control model to individual data packets that are exchanged between ...
Reiner Sailer, M. Kabatnik
ISSRE
2000
IEEE
15 years 9 months ago
Testing Nondeterminate Systems
The behavior of nondeterminate systems can be hard to predict, since similar inputs at different times can generate different outputs. In other words, the behavior seen during tes...
Tim Menzies, Bojan Cukic, Harshinder Singh, John D...
TOOLS
2000
IEEE
15 years 9 months ago
Generic Components to Foster Reuse
Software reuse and especially the paradigm of software components are promising approaches to increase the efficiency of software development. One of the basic problems of softwar...
Lothar Baum, Martin Becker