Sciweavers

423 search results - page 74 / 85
» A Logical Approach to Dynamic Role-Based Access Control
Sort
View
ACSAC
2006
IEEE
14 years 2 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu
ICIW
2009
IEEE
14 years 3 months ago
An Adaptive Scheduling Policy for Staged Applications
The performance of Web servers and application servers is a crucial factor for the success of the underlying business activity. Current commercial servers (such as Apache and Micr...
Mohammad Shadi Al Hakeem, Jan Richling, Gero M&uum...
HYBRID
2007
Springer
14 years 2 months ago
Model Checking Genetic Regulatory Networks with Parameter Uncertainty
The lack of precise numerical information for the values of biological parameters severely limits the development and analysis of models of genetic regulatory networks. To deal wit...
Grégory Batt, Calin Belta, Ron Weiss
ATAL
2005
Springer
14 years 2 months ago
Agent synthesis: partnership and agreement in cooperative mobile agents
This work focuses on an emerging extension to traditional agent models, called Hierarchical Mobile Agents model, where an agent can contain other agents recursively. The model ena...
Fuyuki Ishikawa, Yasuyuki Tahara, Nobukazu Yoshiok...
EMSOFT
2006
Springer
14 years 13 days ago
Software partitioning for effective automated unit testing
A key problem for effective unit testing is the difficulty of partitioning large software systems into appropriate units that can be tested in isolation. We present an approach th...
Arindam Chakrabarti, Patrice Godefroid