Sciweavers

641 search results - page 111 / 129
» A Framework for Analyzing Configurations of Deployable Softw...
Sort
View
110
Voted
ISSTA
2006
ACM
15 years 9 months ago
Role-Based access control consistency validation
Modern enterprise systems support Role-Based Access Control (RBAC). Although RBAC allows restricting access to privileged operations, a deployer may actually intend to restrict ac...
Paolina Centonze, Gleb Naumovich, Stephen J. Fink,...
138
Voted
MOBISYS
2008
ACM
16 years 3 months ago
Detecting energy-greedy anomalies and mobile malware variants
Mobile users of computation and communication services have been rapidly adopting battery-powered mobile handhelds, such as PocketPCs and SmartPhones, for their work. However, the...
Hahnsang Kim, Joshua Smith, Kang G. Shin
105
Voted
CIKM
2004
Springer
15 years 9 months ago
Grammar-based task analysis of web logs
The daily use of Internet-based services is involved with hundreds of different tasks being performed by multiple users. A single task is typically involved with a sequence of Web...
Savitha Srinivasan, Arnon Amir, Prasad M. Deshpand...
128
Voted
CORR
2010
Springer
171views Education» more  CORR 2010»
15 years 3 months ago
An Object-Oriented Metamodel for Bunge-Wand-Weber Ontology
A UML based metamodel for Bunge-Wand-Weber (BWW) ontology is presented. BWW ontology is a generic framework for analysis and conceptualization of real world objects. It includes c...
Arvind W. Kiwelekar, Rushikesh K. Joshi
142
Voted
JOT
2010
115views more  JOT 2010»
14 years 10 months ago
A Rule-Driven Approach for composing Viewpoint-oriented Models
Model composition is a crucial activity in Model Driven Engineering (MDE). It is particularly useful when adopting a multi-modeling approach to analyze and design software systems...
Adil Anwar, Sophie Ebersold, Bernard Coulette, Mah...