Sciweavers

7475 search results - page 1479 / 1495
» Supporting use case based requirements engineering
Sort
View
190
Voted
SIGMOD
2008
ACM
120views Database» more  SIGMOD 2008»
16 years 4 months ago
Muse: a system for understanding and designing mappings
Schema mappings are logical assertions that specify the relationships between a source and a target schema in a declarative way. The specification of such mappings is a fundamenta...
Bogdan Alexe, Laura Chiticariu, Renée J. Mi...
MOBIHOC
2002
ACM
16 years 3 months ago
Message-optimal connected dominating sets in mobile ad hoc networks
A connected dominating set (CDS) for a graph G(V, E) is a subset V of V , such that each node in V - V is adjacent to some node in V , and V induces a connected subgraph. A CDS ha...
Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder
SACMAT
2009
ACM
15 years 10 months ago
Working set-based access control for network file systems
Securing access to files is an important and growing concern in corporate environments. Employees are increasingly accessing files from untrusted devices, including personal hom...
Stephen Smaldone, Vinod Ganapathy, Liviu Iftode
122
Voted
NOMS
2008
IEEE
15 years 10 months ago
Optimizing request denial and latency in an agent-based VPN architecture
—Agent-based virtual private networks architecture (ABVA) refers to the environment where a third-party provider runs and administers remote access VPN service for organizations ...
Haiyang Qian, Steve Dispensa, Deep Medhi
136
Voted
QEST
2008
IEEE
15 years 10 months ago
Quasi-Birth-Death Processes, Tree-Like QBDs, Probabilistic 1-Counter Automata, and Pushdown Systems
We begin by observing that (discrete-time) QuasiBirth-Death Processes (QBDs) are equivalent, in a precise sense, to (discrete-time) probabilistic 1-Counter Automata (p1CAs), and b...
Kousha Etessami, Dominik Wojtczak, Mihalis Yannaka...
« Prev « First page 1479 / 1495 Last » Next »