Sciweavers

1407 search results - page 233 / 282
» Using Use Cases in Executable Z
Sort
View
ICSEA
2007
IEEE
15 years 8 months ago
An Access Control Metamodel for Web Service-Oriented Architecture
— With the mutual consent to use WSDL (Web Service Description Language) to describe web service interfaces and SOAP as the basic communication protocol, the cornerstone for web ...
Christian Emig, Frank Brandt, Sebastian Abeck, J&u...
ADBIS
2007
Springer
124views Database» more  ADBIS 2007»
15 years 8 months ago
Incremental Validation of String-Based XML Data in Databases, File Systems, and Streams
Although the native (tree-like) storage of XML data becomes more and more important there will be an enduring demand to manage XML data in its textual representation, for instance ...
Beda Christoph Hammerschmidt, Christian Werner, Yl...
WADS
2007
Springer
115views Algorithms» more  WADS 2007»
15 years 8 months ago
Priority Queues Resilient to Memory Faults
In the faulty-memory RAM model, the content of memory cells can get corrupted at any time during the execution of an algorithm, and a constant number of uncorruptible registers are...
Allan Grønlund Jørgensen, Gabriel Mo...
101
Voted
ACSAC
2006
IEEE
15 years 8 months ago
Vulnerability Analysis of MMS User Agents
The Multimedia Messaging Service (MMS) is becoming more popular, as mobile phones integrate audio and video recording functionality. Multimedia messages are delivered to users thr...
Collin Mulliner, Giovanni Vigna
124
Voted
ECBS
2006
IEEE
112views Hardware» more  ECBS 2006»
15 years 8 months ago
A Goal-Oriented Approach for Safety Requirements Specification
Robotic systems are developed to execute tasks with several types of risks associated. The possible damages that can affect both the working environment and the self-system lead u...
Elena Navarro, Pedro Sánchez, Patricio Lete...