Sciweavers

1620 search results - page 88 / 324
» Use Case Level Pointcuts
Sort
View
DAGSTUHL
2006
15 years 4 months ago
A Framework for Analyzing Composition of Security Aspects
The methodology of aspect-oriented software engineering has been proposed to factor out concerns that are orthogonal to the core functionality of a system. In particular, this is a...
Jorge Fox, Jan Jürjens
ACMSE
2004
ACM
15 years 8 months ago
Trust based adaptive on demand ad hoc routing protocol
In this paper, we propose a routing protocol that is based on securing the routing information from unauthorized users. Even though routing protocols of this category are already ...
Rajiv K. Nekkanti, Chung-wei Lee
ICDAR
2009
IEEE
15 years 10 months ago
A Novel Feature Extraction and Classification Methodology for the Recognition of Historical Documents
In this paper, we present a methodology for off-line character recognition that mainly focuses on handling the difficult cases of historical fonts and styles. The proposed methodo...
Georgios Vamvakas, Basilios Gatos, Stavros J. Pera...
AINA
2007
IEEE
15 years 9 months ago
Heuristics for Improving Cryptographic Key Assignment in a Hierarchy
In hierarchical distributed systems, shared data access can be controlled by assigning user groups single cryptographic keys that allow high level users derive low level keys, but...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl
ECAL
2007
Springer
15 years 9 months ago
Modeling Decentralized Organizational Change in Honeybee Societies
Multi-agent organizations in dynamic environments, need to have the ability to adapt to environmental changes to ensure a continuation of proper functioning. Such adaptations can b...
Mark Hoogendoorn, Martijn C. Schut, Jan Treur