Sciweavers

635 search results - page 88 / 127
» A Context-Sensitive Access Control Model and Prototype Imple...
Sort
View
SIMUTOOLS
2008
13 years 10 months ago
An 802.16 model for NS2 simulator with an integrated QoS architecture
The IEEE 802.16 technology is emerging as a promising solution for BWA due to its ability to support multimedia services and to operate in multiple physical environments. Also, wi...
Ikbal Chammakhi Msadaa, Fethi Filali, Farouk Kamou...
ICSOFT
2007
13 years 10 months ago
Solving Design Issues in Web Meta-Model Approach to Support End-User Development
End-user development is proposed as a solution to the issues business organisations face when developing web applications to support their business processes. We are proposing a me...
Buddhima De Silva, Athula Ginige
EDBT
2010
ACM
145views Database» more  EDBT 2010»
13 years 12 months ago
Splash: ad-hoc querying of data and statistical models
Data mining is increasingly performed by people who are not computer scientists or professional programmers. It is often done as an iterative process involving multiple ad-hoc tas...
Lujun Fang, Kristen LeFevre
DOLAP
2006
ACM
14 years 2 months ago
Towards a logical multidimensional model for spatial data warehousing and OLAP
Decision support systems (DSS) may be enhanced qualitatively if they are able to also deal with spatial dimensions and measures. Regardless the evident importance of using data wa...
Marcus Costa Sampaio, Andre Gomes de Sousa, Cl&aac...
ICAIL
2007
ACM
14 years 17 days ago
How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach
Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose the adoption of the implementation of minimal precautionary securi...
Luca Compagna, Paul El Khoury, Fabio Massacci, Res...