Sciweavers

2114 search results - page 242 / 423
» Practical Approaches for Software Adaptation
Sort
View
CSREASAM
2008
15 years 6 months ago
Design of an Automatic Password Protection Mechanism for Digital Documents
- Maintaining digital security and privacy are critical issues in the modern workplace. Sensitive and proprietary data is frequently transmitted electronically, and with the large ...
Shashank Kaushik, Thomas Way
IFM
2010
Springer
152views Formal Methods» more  IFM 2010»
15 years 3 months ago
Specification and Verification of Model Transformations Using UML-RSDS
In this paper we describe techniques for the specification and verification of model transformations using a combination of UML and formal methods. The use of UML 2 notations to s...
Kevin Lano, Shekoufeh Kolahdouz Rahimi
DEXA
2009
Springer
175views Database» more  DEXA 2009»
15 years 11 months ago
RoK: Roll-Up with the K-Means Clustering Method for Recommending OLAP Queries
Dimension hierarchies represent a substantial part of the data warehouse model. Indeed they allow decision makers to examine data at different levels of detail with On-Line Analyt...
Fadila Bentayeb, Cécile Favre
140
Voted
SEUS
2009
IEEE
15 years 11 months ago
Fine-Grained Tailoring of Component Behaviour for Embedded Systems
Abstract. The application of run-time reconfigurable component models to networked embedded systems has a number of significant advantages such as encouraging software reuse, ada...
Nelson Matthys, Danny Hughes, Sam Michiels, Christ...
160
Voted
ISORC
2006
IEEE
15 years 11 months ago
Load Balancing Techniques for Distributed Stream Processing Applications in Overlay Environments
Service overlays that support distributed stream processing applications are increasingly being deployed in wide-area environments. The inherent heterogeneous, dynamic and large-s...
Yannis Drougas, Thomas Repantis, Vana Kalogeraki