Sciweavers

114 search results - page 4 / 23
» On the Controlled Evolution of Access Rules in Cooperative I...
Sort
View
HOTSWUP
2009
ACM
14 years 5 days ago
Automating Database Schema Evolution in Information System Upgrades
The complexity, cost, and down-time currently created by the database schema evolution process is the source of incessant problems in the life of information systems and a major s...
Carlo Curino, Hyun Jin Moon, Carlo Zaniolo
TSE
1998
96views more  TSE 1998»
13 years 7 months ago
The Use of Cooperation Scenarios in the Design and Evaluation of a CSCW System
—Design and evaluation of groupware systems raise questions which do not have to be addressed in the context of single user systems. The designer has to take into account not onl...
Oliver Stiemerling, Armin B. Cremers
ISSA
2004
13 years 8 months ago
A Logic-Based Access Control Approach For Web Services
Web Services technology enables organisations to exploit software as a service. Services are accessed by method invocations. Method interfaces are described and published, and may...
Marijke Coetzee
CORR
2006
Springer
113views Education» more  CORR 2006»
13 years 7 months ago
Event Systems and Access Control
Abstract. We consider the interpretations of notions of access control (permissions, interdictions, obligations, and user rights) as run-time properties of information systems spec...
Dominique Méry, Stephan Merz
ISDA
2005
IEEE
14 years 1 months ago
Managing of Cooperative Genetic Algorithms by Intelligent Agent
Genetic Algorithms (GAs) are very popular optimization tool, although efficient applications of GAs requires users have problem with setting their parameters and used genetic ope...
Halina Kwasnicka, Magdalena Gierusz