Sciweavers

3527 search results - page 626 / 706
» Test Automation in Practice
Sort
View
SOUPS
2009
ACM
15 years 4 months ago
How users use access control
Existing technologies for file sharing differ widely in the granularity of control they give users over who can access their data; achieving finer-grained control generally requ...
Diana K. Smetters, Nathan Good
UIST
2009
ACM
15 years 4 months ago
EverybodyLovesSketch: 3D sketching for a broader audience
We present EverybodyLovesSketch, a gesture-based 3D curve sketching system for rapid ideation and visualization of 3D forms, aimed at a broad audience. We first analyze traditiona...
Seok-Hyung Bae, Ravin Balakrishnan, Karan Singh
ICDE
2007
IEEE
134views Database» more  ICDE 2007»
15 years 4 months ago
Apply Model Checking to Security Analysis in Trust Management
Trust management is a form of access control that uses delegation to achieve scalability beyond a single organization or federation. However, delegation can be difficult to contr...
Mark Reith, Jianwei Niu, William H. Winsborough
IEEESCC
2007
IEEE
15 years 4 months ago
Web Services Security and Privacy
eb services are becoming widely deployed to implement the automation of business processes such as supply chain management, inventory tracking, and healthcare management, just to ...
Patrick C. K. Hung, Casey K. Fung
ECSQARU
2007
Springer
15 years 4 months ago
Towards an Extensible Argumentation System
Many types of inter-agent dialogue, including information seeking, negotiation and deliberation can be fruitfully seen as varieties of argumentation. Argumentation frameworks, ori...
Adam Zachary Wyner, Trevor J. M. Bench-Capon