Sciweavers

104 search results - page 19 / 21
» Stakeholder Identification in the Requirements Engineering P...
Sort
View
ACSAC
2009
IEEE
13 years 6 months ago
RoleVAT: Visual Assessment of Practical Need for Role Based Access Control
Abstract--Role based access control (RBAC) is a powerful security administration concept that can simplify permission assignment management. Migration to and maintenance of RBAC re...
Dana Zhang, Kotagiri Ramamohanarao, Steven Verstee...
ATAL
2003
Springer
14 years 1 months ago
Capturing agent autonomy in roles and XML
A key question in the field of agent-oriented software engineering is how the kind and extent of autonomy owned by computational agents can be appropriately captured. As long as ...
Gerhard Weiß, Michael Rovatsos, Matthias Nic...
FCCM
1998
IEEE
169views VLSI» more  FCCM 1998»
14 years 22 days ago
Scalable Network Based FPGA Accelerators for an Automatic Target Recognition Application
Abstract Image processing, specifically Automatic Target Recognition (ATR) in Synthetic Aperture Radar (SAR) imagery, is an application area that can require tremendous processing ...
Ruth Sivilotti, Young Cho, Wen-King Su, Danny Cohe...
SIGSOFT
2003
ACM
14 years 9 months ago
Behaviour model elaboration using partial labelled transition systems
State machine based formalisms such as labelled transition systems (LTS) are generally assumed to be complete descriptions m behaviour at some level of abstraction: if a labelled ...
Sebastián Uchitel, Jeff Kramer, Jeff Magee
APSEC
2005
IEEE
14 years 2 months ago
Feature Analysis for Service-Oriented Reengineering
Web Services together with Service-Oriented Architectures (SOA) are playing an important role in the future of distributed computing, significantly impacting software development ...
Feng Chen, Shaoyun Li, William Cheng-Chung Chu