Sciweavers

4445 search results - page 206 / 889
» Reflective Authorization Systems
Sort
View
150
Voted
VLDB
1999
ACM
113views Database» more  VLDB 1999»
15 years 9 months ago
Hyper-Programming in Java
Hyper-programming is a technology only available in persistent systems, since hyper-program source code contains both text and links to persistent objects. A hyper-programming sys...
Evangelos Zirintsis, Graham N. C. Kirby, Ronald Mo...
EWSA
2006
Springer
15 years 8 months ago
Eliminating Execution Overhead of Disabled Optional Features in Connectors
Connectors are used to realize component interactions in component systems. Apart from their primary function, which is mediating the communication, their implementation can also s...
Lubomír Bulej, Tomás Bures
OHS
2000
Springer
15 years 8 months ago
Standardizing Hypertext: Where Next for OHP?
Abstract. Over the last six years the Open Hypermedia Systems Working Group (OHSWG) has been working in a coordinated effort to produce a protocol which will allow components of an...
David E. Millard, Hugh C. Davis, Luc Moreau
116
Voted
DBSEC
2004
97views Database» more  DBSEC 2004»
15 years 6 months ago
Configuring Storage Area Networks for Mandatory Security
Storage-area networks are a popular and efficient way of building large storage systems both in an enterprise environment and for multi-domain storage service providers. In both en...
Benjamin Aziz, Simon N. Foley, John Herbert, Garre...
CORR
2007
Springer
120views Education» more  CORR 2007»
15 years 4 months ago
Remote laboratories: new technology and standard based architecture
E-Laboratories are important components of elearning environments, especially in scientific and technical disciplines. First widespread E-Labs consisted in proposing simulations o...
Hcene Benmohamed, Arnaud Lelevé, Patrick Pr...