Sciweavers

7112 search results - page 1240 / 1423
» Power in normative systems
Sort
View
CIIA
2009
13 years 10 months ago
Sharing and Protecting Networked Digital Life Memories
The increasing power of computers, increasing capacity of digital memory and wider availability of a great variety of input devices such as cameras and video recorders, has resulte...
Madjid Merabti
ECSA
2010
Springer
13 years 10 months ago
Functional Architecture Modeling for the Software Product Industry
Although a lot of research has been carried out on the technical architecture of software systems, the domain of Functional Architecture in the software product industry lacks a fo...
Sjaak Brinkkemper, Stella Pachidi
COMPSAC
2009
IEEE
13 years 10 months ago
Modular Certification of Low-Level Intermediate Representation Programs
Modular certification of low-level intermediate representation (IR) programs is one of the key steps of proof-transforming compilation. The major challenges are lexity of abstract ...
Yuan Dong, Shengyuan Wang, Liwei Zhang, Ping Yang
ERCIMDL
2010
Springer
168views Education» more  ERCIMDL 2010»
13 years 10 months ago
The Planets Testbed - A Collaborative Research Environment for Digital Preservation
The Planets Testbed is an open access web application for the digital preservation community, providing an experimental framework for evaluating preservation tools and approaches i...
Brian Aitken, Seamus Ross, Andrew Lindley, Edith M...
DBSEC
2009
110views Database» more  DBSEC 2009»
13 years 10 months ago
Distributed Privilege Enforcement in PACS
Abstract. We present a new access control mechanism for P2P networks with distributed enforcement, called P2P Access Control System (PACS). PACS enforces powerful access control mo...
Christoph Sturm, Ela Hunt, Marc H. Scholl
« Prev « First page 1240 / 1423 Last » Next »