Sciweavers

956 search results - page 165 / 192
» Slicing Objects Using System Dependence Graphs
Sort
View
SACMAT
2006
ACM
14 years 4 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
DAGM
1999
Springer
14 years 2 months ago
Knowledge Discovery in Spatial Databases
Both, the number and the size of spatial databases, such as geographic or medical databases, are rapidly growing because of the large amount of data obtained from satellite images,...
Martin Ester, Hans-Peter Kriegel, Jörg Sander
ECBS
1999
IEEE
171views Hardware» more  ECBS 1999»
14 years 2 months ago
Metamodeling - Rapid Design and Evolution of Domain-Specific Modeling Environments
Model integrated computing (MIC) is gaining increased attention as an effective and efficient method for developing, maintaining, and evolving large-scale, domain-specific softwar...
Greg Nordstrom, Janos Sztipanovits, Gabor Karsai, ...
SIGSOFT
2007
ACM
14 years 11 months ago
Towards incremental adaptive covering arrays
The increasing complexity of configurable software systems creates a need for more intelligent sampling mechanisms to detect and locate failure-inducing dependencies between confi...
Adam A. Porter, Myra B. Cohen, Sandro Fouché...
HICSS
2006
IEEE
141views Biometrics» more  HICSS 2006»
14 years 4 months ago
Temporal Implications of Information Technology for Work Practices: Organizing in and for Time in an Emergency Department
We investigate the temporal implications of information technology by examining its use in the work practices of physicians and nurses in an emergency department. We conceptualize...
Zixing Shen, Youngjin Yoo, Kalle Lyytinen