Sciweavers

739 search results - page 114 / 148
» A security framework for the analysis and design of software...
Sort
View
EGOV
2011
Springer
12 years 7 months ago
Pseudonymization Service for X-Road eGovernment Data Exchange Layer
Abstract. Pseudonymization is sometimes used as a light-weight alternative to fully cryptographic solutions, when information from different data sources needs to be linked in a p...
Jan Willemson
CASES
2006
ACM
14 years 1 months ago
High-level power analysis for multi-core chips
Technology trends have led to the advent of multi-core chips in the form of both general-purpose chip multiprocessors (CMPs) and embedded multi-processor systems-on-a-chip (MPSoCs...
Noel Eisley, Vassos Soteriou, Li-Shiuan Peh
OOPSLA
2005
Springer
14 years 1 months ago
Micro patterns in Java code
Micro patterns are similar to design patterns, except that micro patterns stand at a lower, closer to the implementation, level of abstraction. Micro patterns are also unique in t...
Joseph Gil, Itay Maman
JOT
2008
124views more  JOT 2008»
13 years 7 months ago
Methodological Proposal for Business Process Management sustained in the use of Patterns
At the moment, enterprises require complex business models with an organizational structures, processes and systems that must be explicitly designed. The work designed by these bu...
Pedro Bonillo, Nancy Zambrano, Alecia Eleonora Aco...
DOCENG
2010
ACM
13 years 8 months ago
Linking data and presentations: from mapping to active transformations
Modern GUI toolkits, and especially RIA ones, propose the concept of binding to dynamically link domain data and their presentations. Bindings are very simple to use for predefine...
Olivier Beaudoux, Arnaud Blouin