Sciweavers

423 search results - page 66 / 85
» A Logical Approach to Dynamic Role-Based Access Control
Sort
View
RIDE
2002
IEEE
14 years 1 months ago
Extensible Data Management in the Middle-Tier
Current data management solutions are largely optimized for intra-enterprise, client-server applications. They depend on predictability, predefined structure, and universal admini...
Brian F. Cooper, Neal Sample, Michael J. Franklin,...
HASE
2007
IEEE
14 years 3 months ago
Analytic Model for Web Anomalies Classification
In this paper, an analytic technique is proposed to improve the dynamic web application quality and reliability. The technique integrates orthogonal defect classification (ODC), a...
Nasser Alaeddine, Jeff Tian
IJNSEC
2006
88views more  IJNSEC 2006»
13 years 8 months ago
Secure Internet Applications Based on Mobile Agents
The increasing importance of the Internet has motivated the exploration of new execution models based on mobile and dynamic entities to overcome the limits of the client/server mo...
Cungang Yang
ACSC
2006
IEEE
14 years 2 months ago
Manufacturing opaque predicates in distributed systems for code obfuscation
Code obfuscation is a relatively new technique of software protection and it works by deterring reverse engineering attempts by malicious users of software. The objective of obfus...
Anirban Majumdar, Clark D. Thomborson
ASPDAC
1995
ACM
103views Hardware» more  ASPDAC 1995»
14 years 11 days ago
A scheduling algorithm for multiport memory minimization in datapath synthesis
- In this paper, we present a new scheduling algorithms that generates area-efficient register transfer level datapaths with multiport memories. The proposed scheduling algorithm a...
Hae-Dong Lee, Sun-Young Hwang