Sciweavers

7580 search results - page 1361 / 1516
» Prometheus design tool
Sort
View
ASE
2005
96views more  ASE 2005»
15 years 4 months ago
A Termination Detection Protocol for Use in Mobile Ad Hoc Networks
As devices become smaller and wireless networking technologies improve, the popularity of mobile computing continues to rise. In today's world, many consider devices such as c...
Gruia-Catalin Roman, Jamie Payton
IS
2007
15 years 4 months ago
Improving process models by discovering decision points
Workflow management systems (WfMS) are widely used by business enterprises as tools for administrating, automating and scheduling the business process activities with the availab...
Sharmila Subramaniam, Vana Kalogeraki, Dimitrios G...
126
Voted
IVS
2007
100views more  IVS 2007»
15 years 4 months ago
NetLens: iterative exploration of content-actor network data
Networks have remained a challenge for information retrieval and visualization because of the rich set of tasks that users want to accomplish. This paper n abstract Content-Actor ...
Hyunmo Kang, Catherine Plaisant, Bongshin Lee, Ben...
TKDE
2008
177views more  TKDE 2008»
15 years 4 months ago
Analyzing and Managing Role-Based Access Control Policies
Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to ...
Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, M...
TSE
2008
99views more  TSE 2008»
15 years 4 months ago
Modular Information Hiding and Type-Safe Linking for C
This paper presents CMOD, a novel tool that provides a sound module system for C. CMOD works by enforcing a set of four rules that are based on principles of modular reasoning and...
Saurabh Srivastava, Michael Hicks, Jeffrey S. Fost...
« Prev « First page 1361 / 1516 Last » Next »