Sciweavers

641 search results - page 111 / 129
» A Framework for Analyzing Configurations of Deployable Softw...
Sort
View
ISSTA
2006
ACM
14 years 2 months ago
Role-Based access control consistency validation
Modern enterprise systems support Role-Based Access Control (RBAC). Although RBAC allows restricting access to privileged operations, a deployer may actually intend to restrict ac...
Paolina Centonze, Gleb Naumovich, Stephen J. Fink,...
MOBISYS
2008
ACM
14 years 8 months ago
Detecting energy-greedy anomalies and mobile malware variants
Mobile users of computation and communication services have been rapidly adopting battery-powered mobile handhelds, such as PocketPCs and SmartPhones, for their work. However, the...
Hahnsang Kim, Joshua Smith, Kang G. Shin
CIKM
2004
Springer
14 years 2 months ago
Grammar-based task analysis of web logs
The daily use of Internet-based services is involved with hundreds of different tasks being performed by multiple users. A single task is typically involved with a sequence of Web...
Savitha Srinivasan, Arnon Amir, Prasad M. Deshpand...
CORR
2010
Springer
171views Education» more  CORR 2010»
13 years 8 months ago
An Object-Oriented Metamodel for Bunge-Wand-Weber Ontology
A UML based metamodel for Bunge-Wand-Weber (BWW) ontology is presented. BWW ontology is a generic framework for analysis and conceptualization of real world objects. It includes c...
Arvind W. Kiwelekar, Rushikesh K. Joshi
JOT
2010
115views more  JOT 2010»
13 years 3 months ago
A Rule-Driven Approach for composing Viewpoint-oriented Models
Model composition is a crucial activity in Model Driven Engineering (MDE). It is particularly useful when adopting a multi-modeling approach to analyze and design software systems...
Adil Anwar, Sophie Ebersold, Bernard Coulette, Mah...