Sciweavers

596 search results - page 43 / 120
» Theories of Access Consciousness
Sort
View
CCS
2006
ACM
15 years 2 months ago
On the modeling and analysis of obligations
Traditional security policies largely focus on access control requirements, which specify who can access what under what circumstances. Besides access control requirements, the av...
Keith Irwin, Ting Yu, William H. Winsborough
80
Voted
CHI
2005
ACM
15 years 11 months ago
Engaging the city: public interfaces as civic intermediary
This two-day workshop will advance discussion on the role of public interfaces in engaging citizens within the urban context. The aim is to determine how technology can help to de...
Michele F. Chang, Katrina Jungnickel, Chet Orloff,...
CAV
2009
Springer
156views Hardware» more  CAV 2009»
15 years 5 months ago
Towards Performance Prediction of Compositional Models in Industrial GALS Designs
Systems and Networks on Chips (NoCs) are a prime design focus of many hardware manufacturers. In addition to functional verification, which is a difficult necessity, the chip desi...
Nicolas Coste, Holger Hermanns, Etienne Lantreibec...
OOPSLA
2009
Springer
15 years 5 months ago
Language factories
Programming languages are the primary mechanism by which software is created, yet most of us have access to only a few, fixed, programming languages. Any problem we wish to expre...
Tony Clark, Laurence Tratt
HICSS
2008
IEEE
165views Biometrics» more  HICSS 2008»
15 years 5 months ago
CRM and Customer Portfolio Management for E-Tailers
“Don’t put all your eggs in one basket” is common wisdom with respect to financial portfolio theory. The configuration of customer portfolios with regard to appropriate risk...
Dennis Kundisch, Stefan Sackmann, Markus Ruch