Sciweavers

2534 search results - page 430 / 507
» A Type System for the Push-Enter Model
Sort
View
CSREASAM
2006
13 years 9 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
IQ
2001
13 years 9 months ago
Information Envelope and its Information Integrity Implications
: Physical and informational works are strongly interrelated in a business process. This facilitates modeling a business process as an integral part of a closed loop information an...
Vijay V. Mandke, Madhavan K. Nayar, Kamna Malik
ICTAC
2010
Springer
13 years 6 months ago
Preference and Non-deterministic Choice
Material Flow Abstraction of Manufacturing Systems. ‣Umberto Costa, Ivan de Medeiros Jr and Marcel Oliveira. Specification and Verification of a MPI Implementation for a MP-SoC...
Bill Stoddart, Frank Zeyda, Steve Dunne
ISCNZ
1996
IEEE
13 years 12 months ago
Escalation in IT Projects: Can We Afford to Quit or do We Have to Continue?
: Many information technology (IT) projects fail. These projects are not within budget, not on time or do not deliver what was promised. Failures in IT projects are more common tha...
Urban Nuldén
ECHT
1994
13 years 11 months ago
VIKI: Spatial Hypertext Supporting Emergent Structure
The emergent nature of structure is a crucial, but often ignored, constraint on authoring hypertexts. VIKI is a spatial hypertext system that supports the emergent s of structure ...
Catherine C. Marshall, Frank M. Shipman III, James...