Sciweavers

4628 search results - page 70 / 926
» Eliciting information for product modeling using process mod...
Sort
View
SACMAT
2003
ACM
14 years 28 days ago
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Gustaf Neumann, Mark Strembeck
SIGSOFT
2010
ACM
13 years 2 months ago
Evolution of a bluetooth test application product line: a case study
In this paper, we study the decision making process involved in the five year lifecycle of a Bluetooth software product produced by a large, multi-national test and measurement fi...
Narayan Ramasubbu, Rajesh Krishna Balan
ICDE
2009
IEEE
160views Database» more  ICDE 2009»
13 years 5 months ago
Perm: Processing Provenance and Data on the Same Data Model through Query Rewriting
Data provenance is information that describes how a given data item was produced. The provenance includes source and intermediate data as well as the transformations involved in pr...
Boris Glavic, Gustavo Alonso
IMECS
2007
13 years 9 months ago
A Model to Describe the Relationships Man - Machine - Maintenance - Economy (MMME)
— In the globalisation spirit, one of the major objectives of companies is how to reduce the production losses cost-effectively for continuously enhancement of competitiveness an...
Basim Al-Najjar, Daniel Andersson, Martin Jacobsso...
KDD
2004
ACM
237views Data Mining» more  KDD 2004»
14 years 8 months ago
Bayesian Model-Averaging in Unsupervised Learning From Microarray Data
Unsupervised identification of patterns in microarray data has been a productive approach to uncovering relationships between genes and the biological process in which they are in...
Mario Medvedovic, Junhai Guo