Sciweavers

53 search results - page 5 / 11
» Policies based on Trajectory Libraries
Sort
View
POPL
2012
ACM
12 years 3 months ago
A language for automatically enforcing privacy policies
It is becoming increasingly important for applications to protect sensitive data. With current techniques, the programmer bears the burden of ensuring that the application’s beh...
Jean Yang, Kuat Yessenov, Armando Solar-Lezama
ICCBR
2003
Springer
14 years 1 months ago
Evaluation of Case-Based Maintenance Strategies in Software Design
CBR applications running in real domains can easily reach thousands of cases, which are stored in the case library. Retrieval times can increase greatly if the retrieval algorithm ...
Paulo Gomes, Francisco C. Pereira, Paulo Paiva, Nu...
TOIS
2002
87views more  TOIS 2002»
13 years 7 months ago
Peer-to-peer data trading to preserve information
Data archiving systems rely on replication to preserve information. This paper discusses how a network of autonomousarchiving sites can trade data to achievethe most reliable repl...
Brian F. Cooper, Hector Garcia-Molina
ACSAC
2000
IEEE
14 years 12 days ago
Extending Java for Package based Access Control
This paper describes an extension of the Java language that provides “programmable security.” The approach augments the Java syntax with constructs for specifying various acce...
John Hale, Mauricio Papa, Oliver Bremer, Rodrigo C...
ICMCS
2006
IEEE
129views Multimedia» more  ICMCS 2006»
14 years 2 months ago
Media Synchronization Method for Video Hypermedia Application Based on Extended Event Model
This paper describes a proposal of an extended event model using a media synchronization method for video hypermedia applications. In this extended event model, video and metadata...
Hironobu Abe, Hiroshi Shigeno, Ken-ichi Okada