Sciweavers

462 search results - page 85 / 93
» Supporting e-commerce systems formalization with choreograph...
Sort
View
TKDE
2008
177views more  TKDE 2008»
13 years 7 months ago
Analyzing and Managing Role-Based Access Control Policies
Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to ...
Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, M...
CONEXT
2010
ACM
13 years 5 months ago
Declarative configuration management for complex and dynamic networks
Abstract-- Network management and operations are complicated, tedious, and error-prone, requiring significant human involvement and domain knowledge. As the complexity involved ine...
Xu Chen, Yun Mao, Zhuoqing Morley Mao, Jacobus E. ...

Publication
351views
15 years 8 months ago
Synthesizable High Level Hardware Descriptions
Modern hardware description languages support code-generation constructs like generate/endgenerate in Verilog. These constructs are intended to describe regular or parameterized ha...
Jennifer Gillenwater, Gregory Malecha, Cherif Sala...
PLDI
2003
ACM
14 years 1 months ago
A practical flow-sensitive and context-sensitive C and C++ memory leak detector
This paper presents a static analysis tool that can automatically find memory leaks and deletions of dangling pointers in large C and C++ applications. We have developed a type s...
David L. Heine, Monica S. Lam
DOCENG
2007
ACM
13 years 11 months ago
A document engineering environment for clinical guidelines
In this paper, we present a document engineering environment for Clinical Guidelines (G-DEE), which are standardized medical documents developed to improve the quality of medical ...
Gersende Georg, Marie-Christine Jaulent