Sciweavers

3712 search results - page 459 / 743
» Role-Based Access Control
Sort
View
ICDE
2004
IEEE
85views Database» more  ICDE 2004»
16 years 6 months ago
A Frequency-based Approach for Mining Coverage Statistics in Data Integration
Query optimization in data integration requires source coverage and overlap statistics. Gathering and storing the required statistics presents many challenges, not the least of wh...
Zaiqing Nie, Subbarao Kambhampati
WWW
2007
ACM
16 years 5 months ago
Mobile shopping assistant: integration of mobile applications and web services
The goal of this poster is to describe our implementation of a new architecture enabling efficient integration between mobile phone applications and Web Services. Using this archi...
Huaigu Wu, Yuri Natchetoi
CHI
2002
ACM
16 years 5 months ago
A flexible 3d sound system for interactive applications
We have developed a 3D sound system for headphones that allows real-time sound source and user displacement in a virtual acoustic environment. Because of a flexible design that us...
Lalya Gaye
OSDI
2006
ACM
16 years 5 months ago
XFI: Software Guards for System Address Spaces
XFI is a comprehensive protection system that offers both flexible access control and fundamental integrity guarantees, at any privilege level and even for legacy code in commodit...
Úlfar Erlingsson, George C. Necula, Mart&ia...
ICSE
2003
IEEE-ACM
16 years 5 months ago
RUPi - A Unified Process that Integrates Human-Computer Interaction and Software Engineering
This research has the main objective of presenting a study on the areas of Human-Computer Interaction (HCI) and Software Engineering (SE), focusing on the importance of integratin...
Kênia Soares Sousa, Elizabeth Furtado