Sciweavers

3555 search results - page 510 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
SACMAT
2003
ACM
15 years 10 months ago
Cooperative role-based administration
In large organizations the administration of access privileges (such as the assignment of an access right to a user in a particular role) is handled cooperatively through distribu...
Horst Wedde, Mario Lischka
150
Voted
WSC
2004
15 years 6 months ago
Factors Affecting the Expectation of Casualties in the Virtual Range Toxicity Model
The Virtual Range (VR) is an environment that integrates in a seamless fashion several models to improve complex systems visualization. A complex system is a non-linear system of ...
José A. Sepúlveda, Luis C. Rabelo, J...
SOPR
1998
117views more  SOPR 1998»
15 years 5 months ago
Towards mature IT services
Many organizations provide information technology services, either to external or internal customers. They maintain software, operate information systems, manage and maintain work...
Frank Niessink, Hans van Vliet
TVLSI
2002
130views more  TVLSI 2002»
15 years 5 months ago
HW/SW codesign techniques for dynamically reconfigurable architectures
Abstract--Hardward/software (HW/SW) codesign and reconfigurable computing are commonly used methodologies for digitalsystems design. However, no previous work has been carried out ...
Juanjo Noguera, Rosa M. Badia
GIS
2010
ACM
15 years 3 months ago
Querying the future of spatio-temporal objects
Since navigation systems and tracking devices are becoming ubiquitous in our daily life, the development of efficient methods for processing massive sets of mobile objects are of ...
Philip Schmiegelt, Bernhard Seeger