Sciweavers

3686 search results - page 560 / 738
» An Approach to a Trustworthy System Architecture Using Virtu...
Sort
View
EWCBR
2006
Springer
13 years 11 months ago
Supplementing Case-based Recommenders with Context Data
Abstract. We propose that traditional case-based recommender systems can be improved by informing them with context data describing the user's environment. We outline existing...
Lorcan Coyle, Evelyn Balfe, Graeme Stevenson, Stev...
IJNSEC
2008
150views more  IJNSEC 2008»
13 years 8 months ago
Tamper Resistant Software Through Intent Protection
One approach to protect distributed systems implemented with mobile code is through program obfuscation. Disguising program intent is a form of information hiding that facilitates...
Alec Yasinsac, J. Todd McDonald
ICDE
2012
IEEE
256views Database» more  ICDE 2012»
11 years 10 months ago
Micro-Specialization in DBMSes
Abstract—Relational database management systems are general in the sense that they can handle arbitrary schemas, queries, and modifications; this generality is implemented using...
Rui Zhang, Richard T. Snodgrass, Saumya Debray
EMSOFT
2009
Springer
14 years 2 months ago
Clock-driven distributed real-time implementation of endochronous synchronous programs
An important step in model-based embedded system design consists in mapping functional specifications and their tasks/operations onto execution architectures and their ressources...
Dumitru Potop-Butucaru, Robert de Simone, Yves Sor...
RBAC
2000
129views more  RBAC 2000»
13 years 9 months ago
Enabling technologies for role based online decision engines
: Enabling Technologies for Role Based Online Decision Engines Thomas Hildmann, Thomas Gebhardt 22-Feb-2000 The goal of our work at the Technical University of Berlin is to develop...
Thomas Gebhardt, Thomas Hildmann