Sciweavers

341 search results - page 35 / 69
» A Security Engineering Process based on Patterns
Sort
View
116
Voted
ICSE
2005
IEEE-ACM
16 years 2 months ago
An architects guide to enterprise application integration with J2EE and .NET
Architects are faced with the problem of building enterprise scale information systems, with streamlined, automated internal business processes and web-enabled business functions,...
Ian Gorton, Anna Liu
OOPSLA
2005
Springer
15 years 8 months ago
PolyD: a flexible dispatching framework
The standard dispatching mechanisms built into programming languages are sometimes inadequate to the needs of the programmer. In the case of Java, the need for more flexibility h...
Antonio Cunei, Jan Vitek
GBRPR
2005
Springer
15 years 8 months ago
Hypergraph-Based Image Representation
Abstract. An appropriate image representation induces some good image treatment algorithms. Hypergraph theory is a theory of finite combinatorial sets, modeling a lot of problems ...
Alain Bretto, Luc Gillibert
SACMAT
2010
ACM
15 years 27 days ago
Role mining based on weights
Role mining from the existing permissions has been widely applied to aid the process of migrating to an RBAC system. While all permissions are treated evenly in previous approache...
Xiaopu Ma, Ruixuan Li, Zhengding Lu
99
Voted
CONEXT
2008
ACM
15 years 4 months ago
Networking is IPC: a guiding principle to a better internet
This position paper outlines a new network architecture that is based on the fundamental principle that networking is interprocess communication (IPC). In this model, application ...
John Day, Ibrahim Matta, Karim Mattar