Sciweavers

3441 search results - page 338 / 689
» Provenance of Software Development Processes
Sort
View
SIN
2010
ACM
15 years 2 months ago
A calculus for the qualitative risk assessment of policy override authorization
Policy override is gaining traction in the research community to improve the efficiency and usability of authorization mechanisms. These mechanisms turn the conventional privilege...
Steffen Bartsch
171
Voted
AWIC
2011
Springer
14 years 8 months ago
Enabling Product Comparisons on Unstructured Information Using Ontology Matching
Information extraction approaches are heavily used to gather product information on the Web, especially focusing on technical product specifications. If requesting different sour...
Maximilian Walther, Niels Jäckel, Daniel Schu...
ICDE
2012
IEEE
202views Database» more  ICDE 2012»
13 years 7 months ago
Recomputing Materialized Instances after Changes to Mappings and Data
—A major challenge faced by today’s information systems is that of evolution as data usage evolves or new data resources become available. Modern organizations sometimes exchan...
Todd J. Green, Zachary G. Ives
LCTRTS
1998
Springer
15 years 9 months ago
A Tool to Assist in Fine-Tuning and Debugging Embedded Real-Time Systems
: During the latter stages of a software product cycle, developers may be faced with the task of fine-tuning an embedded system that is not meeting all of its timing requirements. ...
Gaurav Arora, David B. Stewart
ACE
2004
179views Education» more  ACE 2004»
15 years 6 months ago
Less Extreme Programming
Industrial practice in software engineering has developed in recent years from rigid heavyweight document-based development techniques, such as the Rational Unified Process, to in...
James Noble, Stuart Marshall, Stephen Marshall, Ro...