Sciweavers

4029 search results - page 772 / 806
» Experience with Software Watermarking
Sort
View
SIGUCCS
2000
ACM
14 years 2 months ago
Training... A Key to Better Help Desk Consultants
The quality of student consultants and their development through training and education are major factors in determining long-term effectiveness of university Help Desk. To hire a...
Anna Maria Perez, Andrea J. Moore
CARDIS
2000
Springer
107views Hardware» more  CARDIS 2000»
14 years 2 months ago
JCCap: Capability-based Access Control for Java Card
: This paper describes JCCap, a protection facility for cooperating applications in the context of Java Card. It enables the control of access rights between mutually suspicious ap...
Daniel Hagimont, Jean-Jacques Vandewalle
RTAS
1999
IEEE
14 years 2 months ago
Timing Constraint Remapping to Avoid Time Discontinuities in Distributed Real-Time Systems
In this paper we propose a dynamic constraint transformation technique for ensuring timing requirements in a distributed real-time system possessing periodically synchronized dist...
Minsoo Ryu, Jungkeun Park, Seongsoo Hong
KDD
1999
ACM
128views Data Mining» more  KDD 1999»
14 years 2 months ago
Towards Automated Synthesis of Data Mining Programs
Code synthesis is routinely used in industry to generate GUIs, form lling applications, and database support code and is even used with COBOL. In this paper we consider the questi...
Wray L. Buntine, Bernd Fischer 0002, Thomas Pressb...
KIVS
1999
Springer
14 years 2 months ago
Mobile Agents as an Architectural Concept for Internet-Based Distributed Applications - The WASP Project Approach
Abstract. After introducing the concept of mobile agents and potential application domains, we motivate why mobile agent technology is an interesting concept for large Internet-bas...
Stefan Fünfrocken, Friedemann Mattern