Sciweavers

1782 search results - page 331 / 357
» Tool Support for Proof Engineering
Sort
View
TKDE
2008
177views more  TKDE 2008»
13 years 8 months ago
Analyzing and Managing Role-Based Access Control Policies
Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to ...
Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, M...
JWSR
2007
106views more  JWSR 2007»
13 years 8 months ago
Architecture-Driven Service Discovery for Service Centric Systems
: Service discovery has been recognised as an important aspect in the development of service centric systems, i.e., software systems which deploy web services. To develop such syst...
Alexander Kozlenkov, George Spanoudakis, Andrea Zi...
CERA
2002
201views more  CERA 2002»
13 years 8 months ago
CAD-Based Shape Optimization Using a Meshfree Method
: A shape design sensitivity analysis and optimization procedure is proposed using a meshfree method. A CAD tool connection is established to facilitate the seamless integration of...
Iulian Grindeanu, Nam Ho Kim, Kung K. Choi, Jiun-S...
COMBINATORICS
1998
79views more  COMBINATORICS 1998»
13 years 8 months ago
A Note on Constructing Large Cayley Graphs of Given Degree and Diameter by Voltage Assignments
Voltage graphs are a powerful tool for constructing large graphs (called lifts) with prescribed properties as covering spaces of small base graphs. This makes them suitable for ap...
Ljiljana Brankovic, Mirka Miller, Ján Plesn...
IS
1998
13 years 8 months ago
Specifying Global Behaviour in Database Federations
Abstract - We discuss the impact of locally implemented behaviour on global behaviour specification in a federation of object-oriented databases. In particular, given a specificati...
Mark W. W. Vermeer, Peter M. G. Apers