Sciweavers

5904 search results - page 915 / 1181
» Requirements for a Composition Language
Sort
View
146
Voted
TKDE
2008
177views more  TKDE 2008»
15 years 3 months ago
Analyzing and Managing Role-Based Access Control Policies
Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to ...
Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, M...
123
Voted
JIIS
2007
133views more  JIIS 2007»
15 years 3 months ago
SPHINX: Schema integration by example
The Internet has instigated a critical need for automated tools that facilitate integrating countless databases. Since non-technical end users are often the ultimate repositories ...
François Barbançon, Daniel P. Mirank...
144
Voted
CGF
2005
232views more  CGF 2005»
15 years 3 months ago
Algorithms for Interactive Editing of Level Set Models
Level set models combine a low-level volumetric representation, the mathematics of deformable implicit surfaces, and powerful, robust numerical techniques to produce a novel appro...
Ken Museth, David E. Breen, Ross T. Whitaker, Sean...
CJ
2000
101views more  CJ 2000»
15 years 3 months ago
Safe Structural Conformance for Java
In Java, an interface specifies public abstract methods and associated public constants. Conformance of a class to an interface is by name. We propose to allow structural conforma...
Konstantin Läufer, Gerald Baumgartner, Vincen...
187
Voted
GIS
2002
ACM
15 years 3 months ago
Metadata modeling in a global computing environment
Emerging computational paradigms such as global and ubiquitous computing require some rethinking and innovative research ideas in many computer science areas. In this work, we aim...
Dieter Pfoser, Evaggelia Pitoura, Nectaria Tryfona