Sciweavers

495 search results - page 92 / 99
» Translating the Object Constraint Language into the Java Mod...
Sort
View
IFIP
2001
Springer
14 years 1 months ago
Security Documentation
Effective security management depends upon good risk management, which is itself based upon a reliable risk assessment, involving data collection of all the facets influencing sys...
Lam-for Kwok, Peggy P. K. Fung, Dennis Longley
MMSEC
2005
ACM
137views Multimedia» more  MMSEC 2005»
14 years 2 months ago
A fragile watermarking scheme for 3D meshes
In this paper, we propose a new fragile watermarking scheme for 3D meshes. Firstly, the watermark information is adaptively embedded into the mesh geometry by slightly adjusting t...
Hao-Tian Wu, Yiu-ming Cheung
ICDE
2002
IEEE
136views Database» more  ICDE 2002»
14 years 10 months ago
Mixing Querying and Navigation in MIX
Web-based information systems provide to their users the ability to interleave querying and browsing during their information discovery efforts. The MIX system provides an API cal...
Pratik Mukhopadhyay, Yannis Papakonstantinou
EUROMICRO
2005
IEEE
14 years 2 months ago
Composition Assessment Metrics for CBSE
Objective: Formal definition of composition assessment metrics for CBSE, using an extension of the CORBA Component Model metamodel as the ontology for describing component assembl...
Miguel Goulão, Fernando Brito e Abreu
DSS
2006
140views more  DSS 2006»
13 years 8 months ago
Access control and audit model for the multidimensional modeling of data warehouses
Due to the sensitive data contained in Data Warehouses (DW), it is essential to specify security measures from the early stages of the DW design and enforce them. Traditional acce...
Eduardo Fernández-Medina, Juan Trujillo, Ro...