Sciweavers

2338 search results - page 291 / 468
» Using UML to model relational database operations
Sort
View
ISF
2008
114views more  ISF 2008»
15 years 5 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
ER
2004
Springer
169views Database» more  ER 2004»
15 years 10 months ago
Intentional Modeling to Support Identity Management
Identity management has arisen as a major and urgent challenge for internet-based communications and information services. Internet services involve complex networks of relationshi...
Lin Liu, Eric S. K. Yu
GIS
2004
ACM
16 years 6 months ago
Representing spatiality in a conceptual multidimensional model
Data Warehouses and On-Line Analytical Processing systems rely on a multidimensional model that includes dimensions, hierarchies, and measures. Such model allows to express users&...
Elzbieta Malinowski, Esteban Zimányi
UIST
2000
ACM
15 years 9 months ago
A temporal model for multi-level undo and redo
A number of recent systems have provided rich facilities for manipulating the timelines of applications. Such timelines represent the history of an application’s use in some ses...
W. Keith Edwards, Takeo Igarashi, Anthony LaMarca,...
155
Voted
CIKM
2008
Springer
15 years 7 months ago
An extended cooperative transaction model for xml
In many application areas, for example in design or media production processes, several authors have to work cooperatively on the same project. Thereby, a frequently used data for...
Francis Gropengießer, Kai-Uwe Sattler