Sciweavers

580 search results - page 25 / 116
» A Requirements Elicitation Approach Based in Templates and P...
Sort
View
SACMAT
2003
ACM
14 years 1 months ago
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Gustaf Neumann, Mark Strembeck
BNCOD
2007
96views Database» more  BNCOD 2007»
13 years 9 months ago
Extracting Temporal Information from Short Messages
Abstract. Information Extraction, the process of eliciting data from natural language documents, usually relies on the ability to parse the document and then to detect the meaning ...
Richard Cooper, Sinclair Manson
ICWE
2009
Springer
14 years 2 months ago
Patterns for the Model-Based Development of RIAs
Rich Internet Applications (RIAs) are highly interactive web applications that resemble desktop applications. Modeling RIAs hence requires techniques for web modeling enriched by m...
Nora Koch, Matthias Pigerl, Gefei Zhang, Tatiana M...
DEXAW
2007
IEEE
111views Database» more  DEXAW 2007»
14 years 2 months ago
A Security Engineering Process based on Patterns
We present a security engineering process based on security problem frames and concretized security problem frames. Both kinds of frames constitute patterns for analyzing security...
Denis Hatebur, Maritta Heisel, Holger Schmidt
IDEAL
2009
Springer
13 years 5 months ago
Implementation and Integration of Algorithms into the KEEL Data-Mining Software Tool
This work is related to the KEEL1 (Knowledge Extraction based on Evolutionary Learning) tool, a non-commercial software that supports data management, design of experiments and an ...
Alberto Fernández, Julián Luengo, Jo...