Sciweavers

123 search results - page 4 / 25
» Patterns for Automated Management of Security and Dependabil...
Sort
View
OOPSLA
2005
Springer
14 years 3 days ago
Using dependency models to manage complex software architecture
An approach to managing the architecture of large software systems is presented. Dependencies are extracted from the code by a conventional static analysis, and shown in a tabular...
Neeraj Sangal, Ev Jordan, Vineet Sinha, Daniel Jac...
CCS
2009
ACM
13 years 11 months ago
TruWallet: trustworthy and migratable wallet-based web authentication
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadegh...
SWAP
2008
13 years 8 months ago
OWL Change Management Patterns
Ontology evolution is a complex problem. In our work, we focus on issues related to change management, particularly consistency maintenance and we present in this paper, an overvie...
Rim Djedidi, Marie-Aude Aufaure
COR
2002
95views more  COR 2002»
13 years 6 months ago
Dynamic lot sizing and tool management in automated manufacturing systems
The overall aim of this study is to show that there is a critical interface between the lot sizing and tool management decisions, and these two problems cannot be viewed in isolat...
M. Selim Akturk, Siraceddin Onen
SACMAT
2009
ACM
14 years 1 months ago
Automating role-based provisioning by learning from examples
Role-based provisioning has been adopted as a standard component in leading Identity Management products due to its low administration cost. However, the cost of adjusting existin...
Qun Ni, Jorge Lobo, Seraphin B. Calo, Pankaj Rohat...