Sciweavers

5756 search results - page 112 / 1152
» Describing Objects by their Attributes
Sort
View
FAST
2009
13 years 7 months ago
Scalable Access Controls for Lineage
Lineage stores often contain sensitive information that needs protection from unauthorized access. We build on prior work for security and privacy of lineage information, focusing...
Arnon Rosenthal, Len Seligman, Adriane Chapman, Ba...
ICSE
1999
IEEE-ACM
14 years 1 months ago
Experience with Performing Architecture Tradeoff Analysis
Software architectures, like complex designs in any field, embody tradeoffs made by the designers. However, these tradeoffs are not always made explicitly by the designers and the...
Rick Kazman, Mario Barbacci, Mark Klein, S. Jeromy...
PAKDD
1999
ACM
124views Data Mining» more  PAKDD 1999»
14 years 1 months ago
Discovery of Equations and the Shared Operational Semantics in Distributed Autonomous Databases
Empirical equations are an important class of regularities that can be discovered in databases. In this paper we concentrate on the role of equations as de nitions of attribute val...
Zbigniew W. Ras, Jan M. Zytkow
ICAT
2006
IEEE
14 years 3 months ago
Tangible Cubes as Programming Objects
In this paper, we describe early results in the development of an alternative programming method which uses large, three-dimensional acrylic blocks to construct programming sequen...
Andrew C. Smith
ICNS
2006
IEEE
14 years 3 months ago
Promise theory - a model of autonomous objects for pervasive computing and swarms
Abstract— The theory of promises describes policy governed services, in a framework of completely autonomous agents, which assist one another by voluntary cooperation alone. We p...
Mark Burgess, Siri Fagernes