Sciweavers

3377 search results - page 567 / 676
» Describing differences between databases
Sort
View
CSSE
2004
IEEE
13 years 9 months ago
A comparison of modeling strategies in defining XML-based access control languages
One of the most important features of XML-based Web services is that they can be easily accessed over the Internet, but this makes them vulnerable to a series of security threats....
Claudio Agostino Ardagna, Sabrina De Capitani di V...
CMOT
2002
73views more  CMOT 2002»
13 years 9 months ago
A Structural and Evolutionary Approach to Change Management
Organizational change management is concerned with realizing strategies using models, methods and prescriptions that seek to guide the three key elements of strategic management p...
Thierry Rakotobe-Joel, Ian P. McCarthy, David Tran...
ENTCS
2000
112views more  ENTCS 2000»
13 years 9 months ago
Typed Multiset Rewriting Specifications of Security Protocols
The language MSR has successfully been used in the past to prove undecidability about security protocols modeled according to the Dolev-Yao abstraction. In this paper, we revise t...
Iliano Cervesato
EWC
2002
86views more  EWC 2002»
13 years 8 months ago
On Object-Oriented Frameworks and Coordinate Free Formulations of PDEs
An object-oriented (OO) framework for Partial tial Equations (PDEs) provides software abstractions for numerical simulation of PDEs. The design of such frameworks is not trivial, a...
Magne Haveraaen, Hans Z. Munthe-Kaas, Krister &Ari...
ALGORITHMICA
1999
84views more  ALGORITHMICA 1999»
13 years 8 months ago
Computational Approaches to Drug Design
Abstract. The rational approach to pharmaceutical drug design begins with an investigation of the relationship between chemical structure and biological activity. Information gaine...
Paul W. Finn, Lydia E. Kavraki