Sciweavers

208 search results - page 32 / 42
» Consistency Checking for Component Reuse in Open Systems
Sort
View
CSREASAM
2006
13 years 9 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
IPPS
2009
IEEE
14 years 2 months ago
DMTCP: Transparent checkpointing for cluster computations and the desktop
DMTCP (Distributed MultiThreaded CheckPointing) is a transparent user-level checkpointing package for distributed applications. Checkpointing and restart is demonstrated for a wid...
Jason Ansel, Kapil Arya, Gene Cooperman
HT
1997
ACM
13 years 11 months ago
Supporting User-defined Activity Spaces
Activity spaces are usually task-specific and only common to a group of people who work together in a certain application domain. It is desirable to enable users to define and mod...
Weigang Wang, Jörg M. Haake
CI
1999
90views more  CI 1999»
13 years 7 months ago
Efficient Implementation of Semantic Relations in Lexical Databases
In this paper we develop a formalization of semantic relations that facilitates efficient implementations of relations in lexical databases or knowledge representation systems usi...
Uta Priss
ICWE
2005
Springer
14 years 1 months ago
Modelling the Behaviour of Web Applications with ArgoUWE
A methodology needs to be empowered by appropriate tool support. The CASE tool ArgoUWE supports designers in the use of the UWE methodology for the systematic, UML-based developmen...
Alexander Knapp, Nora Koch, Gefei Zhang