Sciweavers

979 search results - page 166 / 196
» Generating a Prototype from a UML Model of System Requiremen...
Sort
View
ACSAC
2004
IEEE
14 years 18 days ago
Using Predators to Combat Worms and Viruses: A Simulation-Based Study
Large-scale attacks generated by fast-spreading or stealthy malicious mobile code, such as flash worms and e-mail viruses, demand new approaches to patch management and disinfecti...
Ajay K. Gupta 0002, Daniel C. DuVarney
SOUPS
2006
ACM
14 years 2 months ago
Intentional access management: making access control usable for end-users
The usability of access control mechanisms in modern distributed systems has been widely criticized but little studied. In this paper, we carefully examine one such widely deploye...
Xiang Cao, Lee Iverson
POPL
2004
ACM
14 years 9 months ago
Incremental execution of transformation specifications
We aim to specify program transformations in a declarative style, and then to generate executable program transformers from such specifications. Many transformations require non-t...
Ganesh Sittampalam, Oege de Moor, Ken Friis Larsen
IV
2008
IEEE
99views Visualization» more  IV 2008»
14 years 3 months ago
Visualization Enhanced Semantic Wikis for Patent Information
In this paper we present a new approach for using semantic wikis for collaborative patent search and annotation. We describe an extension that allows integrating interactive visua...
Mark Giereth, Thomas Ertl
HICSS
2000
IEEE
133views Biometrics» more  HICSS 2000»
14 years 1 months ago
Research, Development, and Demonstration Needs for Large-Scale, Reliability-Enhancing, Integration of Distributed Energy Resourc
Distributed energy resources (DER) are in transition from the lab to the marketplace. The defining characteristic of DER is that they are active devices installed at the distribut...
Joseph Eto, Vikram Budhraja, Carlos Martinez, Jim ...