Sciweavers

739 search results - page 90 / 148
» Information Flow in Credential Systems
Sort
View
DAWAK
2008
Springer
13 years 9 months ago
UML-Based Modeling for What-If Analysis
In order to be able to evaluate beforehand the impact of a strategical or tactical move, decision makers need reliable previsional systems. What-if analysis satisfies this need by ...
Matteo Golfarelli, Stefano Rizzi
UTP
2010
13 years 5 months ago
Unifying Theories of Confidentiality
Abstract. This paper presents a framework for reasoning about the security of confidential data within software systems. A novelty is that we use Hoare and He's Unifying Theor...
Michael J. Banks, Jeremy L. Jacob
ICDE
2008
IEEE
149views Database» more  ICDE 2008»
14 years 9 months ago
Orchid: Integrating Schema Mapping and ETL
This paper describes Orchid, a system that converts declarative mapping specifications into data flow specifications s) and vice versa. Orchid provides an abstract operator model t...
Stefan Dessloch, Mauricio A. Hernández, Rya...
CHI
2003
ACM
14 years 8 months ago
Alternative "vision": a haptic and auditory assistive device
We have used two cameras and a SensAble Technologies "Phantom" force-feedback haptic display to haptically render a three-dimensional surface that represents key aspects...
Daniel Morris, Neel Joshi
IUI
2009
ACM
14 years 2 months ago
A scientific workflow construction command line
Workflows have emerged as a common tool for scientists to express their computational analyses. While there are a multitude of visual data flow editors for workflow construction, ...
Paul T. Groth, Yolanda Gil