Sciweavers

359 search results - page 46 / 72
» Supporting Real World Security Models in Java
Sort
View
EDBTW
2006
Springer
15 years 6 months ago
Context Consistency Management Using Ontology Based Model
Abstract. Inconsistent contexts are death-wounds which usually result in contextaware applications' incongruous behaviors and users' perplexed feelings, therefore the ben...
Yingyi Bu, Shaxun Chen, Jun Li, XianPing Tao, Jian...
OOPSLA
2009
Springer
15 years 9 months ago
Typestate-oriented programming
Objects model the world, and state is fundamental to a faithful modeling. Engineers use state machines to understand and reason about state transitions, but programming languages ...
Jonathan Aldrich, Joshua Sunshine, Darpan Saini, Z...
OTM
2007
Springer
15 years 8 months ago
Multi-stage Aspect-Oriented Composition of Component-Based Applications
Abstract. The creation of distributed applications requires sophisticated compositions, as various components — supporting application logic or non-functional requirements — mu...
Bert Lagaisse, Eddy Truyen, Wouter Joosen
MMSEC
2006
ACM
231views Multimedia» more  MMSEC 2006»
15 years 8 months ago
JPEG2000-based secure image authentication
We present an efficient JPEG2000-based image authentication scheme, which is robust to JPEG compression and other allowed signal processing operations. Positive wavelet-based wate...
Mathias Schlauweg, Dima Pröfrock, Erika M&uum...
118
Voted
COMAD
2009
15 years 3 months ago
When to Trigger Active Rules?
Active rules model and enforce enterprise requirements such as situation monitoring using events, conditions and actions. These rules are termed active rules as they make the unde...
Raman Adaikkalavan, Sharma Chakravarthy