Sciweavers

588 search results - page 107 / 118
» A Domain Specific Language for Cryptography
Sort
View
143
Voted
TKDE
2008
177views more  TKDE 2008»
15 years 3 months ago
Analyzing and Managing Role-Based Access Control Policies
Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to ...
Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, M...
142
Voted
TOG
2008
143views more  TOG 2008»
15 years 3 months ago
Discovering structural regularity in 3D geometry
We introduce a computational framework for discovering regular or repeated geometric structures in 3D shapes. We describe and classify possible regular structures and present an e...
Mark Pauly, Niloy J. Mitra, Johannes Wallner, Helm...
121
Voted
JOT
2007
99views more  JOT 2007»
15 years 3 months ago
A Framework to Specify Declarative Rules on Objects, Attributes and Associations in the Object Model
There are various mechanisms for creating an application object model. These mechanisms are used for modeling the application Meta model and the user models. Some of the mechanism...
C. Anantaram
113
Voted
CACM
1998
83views more  CACM 1998»
15 years 3 months ago
A Pattern System for Network Management Interfaces
: The development of network management interfaces (NMIs) involves a variety of software layers, application programming interfaces (APIs), specification languages and tools. In or...
Rudolf K. Keller, Jean Tessier, Gregor von Bochman...
139
Voted
GG
2010
Springer
15 years 1 months ago
Declarative Mesh Subdivision Using Topological Rewriting in MGS
Mesh subdivision algorithms are usually specified informally using graphical schemes defining local mesh refinements. These algorithms are then implemented efficiently in an impera...
Antoine Spicher, Olivier Michel, Jean-Louis Giavit...