Sciweavers

2429 search results - page 189 / 486
» Using Aspects to Design a Secure System
Sort
View
124
Voted
ICWL
2007
Springer
15 years 8 months ago
Language-Driven Development of Web-Based Learning Applications
In this paper we propose a language-driven approach for the high-level design of web-based learning applications. In our approach we define a domainspecific language that character...
José Luis Sierra, Baltasar Fernández...
148
Voted
MICRO
2009
IEEE
507views Hardware» more  MICRO 2009»
15 years 9 months ago
Enhancing lifetime and security of PCM-based main memory with start-gap wear leveling
Phase Change Memory (PCM) is an emerging memory technology that can increase main memory capacity in a cost-effective and power-efficient manner. However, PCM cells can endure on...
Moinuddin K. Qureshi, John Karidis, Michele France...
108
Voted
EICS
2010
ACM
15 years 4 months ago
UI generation from task, domain and user models: the DB-USE approach
Information Systems UI (User Interface) generation from declarative models has been the focus of numerous and various approaches in the human computer interaction community. Typic...
Vi Tran
ATAL
2006
Springer
15 years 4 months ago
SAgent: a security framework for JADE
This paper presents SAgent, a general-purpose mobile agent security framework that is designed to protect the computations of mobile agent applications in potentially hostile envi...
Vandana Gunupudi, Stephen R. Tate
120
Voted
SACMAT
2009
ACM
15 years 9 months ago
Working set-based access control for network file systems
Securing access to files is an important and growing concern in corporate environments. Employees are increasingly accessing files from untrusted devices, including personal hom...
Stephen Smaldone, Vinod Ganapathy, Liviu Iftode