Sciweavers

2512 search results - page 313 / 503
» Software Transactional Memory
Sort
View
APPINF
2003
15 years 5 months ago
Requirement Indicators for Mobile Work: The MOWAHS Approach
This paper describes eight requirement indicators derived from a mobile work characterisation framework (MWCF). The MWCF is a framework for analysing mobile scenarios (mobile task...
Heri Ramampiaro, Alf Inge Wang, Carl-Fredrik S&osl...
DBSEC
2003
149views Database» more  DBSEC 2003»
15 years 5 months ago
Anti-Tamper Databases: Querying Encrypted Databases
With mobile computing and powerful laptops, databases with sensitive data can be physically retrieved by malicious users who can employ techniques that were not previously thought...
Gultekin Özsoyoglu, David A. Singer, Sun S. C...
DBSEC
2000
110views Database» more  DBSEC 2000»
15 years 5 months ago
Role-Based Security in a Distributed Resource Environment
There are many technologies for distributed processing/interoperation, including CORBA, DCE, DCOM, Enterprise Java Beans, Java IDL, JDBC, etc. Most promising, is the emergence of ...
Steven A. Demurjian, T. C. Ting, J. Balthazar, H. ...
CIDR
2009
133views Algorithms» more  CIDR 2009»
15 years 5 months ago
Principles for Inconsistency
Data consistency is very desirable because strong semantic properties make it easier to write correct programs that perform as users expect. However, there are good reasons why co...
Shel Finkelstein, Dean Jacobs, Rainer Brendle
CORR
2008
Springer
81views Education» more  CORR 2008»
15 years 4 months ago
Revisiting the Core Ontology and Problem in Requirements Engineering
In their seminal paper in the ACM Transactions on Software Engineering and Methodology, Zave and Jackson established a core ontology for Requirements Engineering (RE) and used it ...
Ivan Jureta, John Mylopoulos, Stéphane Faul...