Sciweavers

3605 search results - page 178 / 721
» Associated types with class
Sort
View
COMPSAC
2001
IEEE
15 years 7 months ago
Designing Role Hierarchies for Access Control in Workflow Systems
he correspondence between the role abstraction in Role-based Access Control (RBAC) and the notion of organizational positions, it seems easy to construct role hierarchies. This is...
Reinhardt A. Botha, Jan H. P. Eloff
IPCCC
2007
IEEE
15 years 10 months ago
SpyCon: Emulating User Activities to Detect Evasive Spyware
The success of any spyware is determined by its ability to evade detection. Although traditional detection methodologies employing signature and anomaly based systems have had rea...
Madhusudhanan Chandrasekaran, Vidyaraman Vidyarama...
APPROX
2006
Springer
162views Algorithms» more  APPROX 2006»
15 years 7 months ago
Approximating Precedence-Constrained Single Machine Scheduling by Coloring
Abstract. This paper investigates the relationship between the dimension theory of partial orders and the problem of scheduling precedenceconstrained jobs on a single machine to mi...
Christoph Ambühl, Monaldo Mastrolilli, Ola Sv...
MOC
1998
86views more  MOC 1998»
15 years 3 months ago
Vector subdivision schemes and multiple wavelets
We consider solutions of a system of refinement equations written in the form φ = α∈Z a(α)φ(2 · −α), where the vector of functions φ = (φ1, . . . , φr)T is in (Lp(R))...
Rong-Qing Jia, Sherman D. Riemenschneider, Ding-Xu...
ECOOP
2008
Springer
15 years 5 months ago
Safe Cross-Language Inheritance
Inheritance is a standard means for reuse and for interfacing with external libraries. In a multi-language software product, extending a class written in a statically-typed languag...
Kathryn E. Gray