Sciweavers

2429 search results - page 362 / 486
» Using Aspects to Design a Secure System
Sort
View
JCDL
2009
ACM
162views Education» more  JCDL 2009»
15 years 4 months ago
No bull, no spin: a comparison of tags with other forms of user metadata
User-contributed tags have shown promise as a means of indexing multimedia collections by harnessing the combined efforts and enthusiasm of online communities. But tags are only o...
Catherine C. Marshall
SCCC
1998
IEEE
15 years 2 months ago
Software Architectural Specification for Optimal Object Distribution
Software architectural design is essential for complex distributed applications. Architectural specifications need to define the key aspects of the application, including its inte...
M. Cecilia Bastarrica, Steven A. Demurjian, Alexan...
DOLAP
2005
ACM
14 years 12 months ago
Towards a spatial multidimensional model
Data warehouses and OLAP systems help to interactively analyze huge volume of data. This data, extracted from transactional databases, frequently contains spatial information whic...
Sandro Bimonte, Anne Tchounikine, Maryvonne Miquel
DGO
2009
118views Education» more  DGO 2009»
14 years 11 months ago
Towards collaborative web-based impact assessment
Impact assessment (IA) is a key method for the legislator to evaluate policies, norms or regulations currently under development. Experts use IA to gather and analyze input from m...
Clemens Heidinger, Erik Buchmann, Klemens Böh...
ICCAD
2009
IEEE
121views Hardware» more  ICCAD 2009»
14 years 7 months ago
MOLES: Malicious off-chip leakage enabled by side-channels
Economic incentives have driven the semiconductor industry to separate design from fabrication in recent years. This trend leads to potential vulnerabilities from untrusted circui...
Lang Lin, Wayne Burleson, Christof Paar