Sciweavers

1187 search results - page 194 / 238
» Extensible Requirements Patterns of Web Application for Effi...
Sort
View
JSS
1998
139views more  JSS 1998»
13 years 7 months ago
Human-computer interaction: Interdisciplinary roots and trends
Methodology, theory, and practice in the ®eld of Human±Computer Interaction (HCI) all share the goal of producing interactive software that can be used eciently, e€ectively, ...
H. Rex Hartson
SIGMOD
2004
ACM
262views Database» more  SIGMOD 2004»
14 years 7 months ago
The Next Database Revolution
Database system architectures are undergoing revolutionary changes. Most importantly, algorithms and data are being unified by integrating programming languages with the database ...
Jim Gray
ICDE
2008
IEEE
200views Database» more  ICDE 2008»
14 years 2 months ago
Enforcing security in semantics driven policy based networks
— Security is emerging as an important requirement for a number of distributed applications such as online banking, social networking etc. due to the private nature of the data b...
Palanivel Balaji Kodeswaran, Sethuram Balaji Kodes...
CCS
2007
ACM
13 years 11 months ago
Improving multi-tier security using redundant authentication
Multi-tier web server systems are used in many important contexts and their security is a major cause of concern. Such systems can exploit strategies like least privilege to make ...
Jodie P. Boyer, Ragib Hasan, Lars E. Olson, Nikita...
ALENEX
2004
107views Algorithms» more  ALENEX 2004»
13 years 9 months ago
An Experimental Analysis of a Compact Graph Representation
In previous work we described a method for compactly representing graphs with small separators, which makes use of small separators, and presented preliminary experimental results...
Daniel K. Blandford, Guy E. Blelloch, Ian A. Kash