Sciweavers

12551 search results - page 2407 / 2511
» Reuse in Systems Engineering
Sort
View
155
Voted
MMMACNS
2005
Springer
15 years 11 months ago
A Modal Logic for Role-Based Access Control
Making correct access-control decisions is central to security, which in turn requires accounting correctly for the identity, credentials, roles, authority, and privileges of users...
Thumrongsak Kosiyatrakul, Susan Older, Shiu-Kai Ch...
PLDI
2004
ACM
15 years 11 months ago
Region inference for an object-oriented language
Region-based memory management offers several important potential advantages over garbage collection, including real-time performance, better data locality, and more efficient us...
Wei-Ngan Chin, Florin Craciun, Shengchao Qin, Mart...
SAC
2004
ACM
15 years 11 months ago
A method to define an Enterprise Architecture using the Zachman Framework
The proliferation of IT and its consequent dispersion is an enterprise reality, however, most organizations do not have adequate tools and/or methodologies that enable the managem...
Carla Marques Pereira, Pedro Sousa
AH
2004
Springer
15 years 11 months ago
Using SiteRank for Decentralized Computation of Web Document Ranking
Abstract. The PageRank algorithm demonstrates the significance of the computation of document ranking of general importance or authority in Web information retrieval. However, doi...
Jie Wu, Karl Aberer
CAISE
2004
Springer
15 years 11 months ago
An Approach to the Enterprise Integration
This paper describes the evolution and the results of the research work carried out by the IRIS group in the field of enterprise integration. This research work began with the ARD...
Ricardo Chalmeta, Reyes Grangel, Cristina Campos, ...
« Prev « First page 2407 / 2511 Last » Next »