Sciweavers

213 search results - page 15 / 43
» diagrams 2004
Sort
View
121
Voted
DBSEC
2004
170views Database» more  DBSEC 2004»
15 years 3 months ago
RBAC/MAC Security Analysis and Design for UML
In software construction, analysis investigates the boundary of a system (scope and requirements), its usage and access, and from a security perspective, who needs access to what ...
Thuong Doan, Steven A. Demurjian, Charles E. Phill...
ER
2004
Springer
246views Database» more  ER 2004»
15 years 7 months ago
Data Mapping Diagrams for Data Warehouse Design with UML
Abstract. In Data Warehouse (DW) scenarios, ETL (Extraction, Transformation, Loading) processes are responsible for the extraction of data from heterogeneous operational data sourc...
Sergio Luján-Mora, Panos Vassiliadis, Juan ...
PLDI
2004
ACM
15 years 7 months ago
Cloning-based context-sensitive pointer alias analysis using binary decision diagrams
This paper presents the first scalable context-sensitive, inclusionbased pointer alias analysis for Java programs. Our approach to context sensitivity is to create a clone of a m...
John Whaley, Monica S. Lam
RISE
2004
Springer
15 years 7 months ago
A Symbolic Model Checker for tccp Programs
In this paper, we develop a symbolic representation for timed concurrent constraint (tccp) programs, which can be used for defining a lightweight model–checking algorithm for re...
María Alpuente, Moreno Falaschi, Alicia Vil...
78
Voted
ESANN
2004
15 years 3 months ago
Input Space Bifurcation Manifolds of RNNs
We derive analytical expressions of local codim-1-bifurcations for a fully connected, additive, discrete-time RNN, where we regard the external inputs as bifurcation parameters. Th...
Robert Haschke, Jochen J. Steil