Sciweavers

696 search results - page 123 / 140
» Using Task Descriptions for the Specification of Web Applica...
Sort
View
IEEEARES
2010
IEEE
14 years 3 months ago
Strategies for Reducing Risks of Inconsistencies in Access Control Policies
—Managing access control policies is a complex task. We argue that much of the complexity is unnecessary and mostly due to historical reasons. There are number of legacy policy s...
Bernard Stepien, Stan Matwin, Amy P. Felty
PETRA
2010
ACM
13 years 10 months ago
Benchmarking dynamic time warping for music retrieval
We study the performance of three dynamic programming methods on music retrieval. The methods are designed for time series matching but can be directly applied to retrieval of mus...
Jefrey Lijffijt, Panagiotis Papapetrou, Jaakko Hol...
AOSD
2008
ACM
13 years 10 months ago
"Program, enhance thyself!": demand-driven pattern-oriented program enhancement
Program enhancement refers to adding new functionality to an existing program. We argue that repetitive program enhancement tasks can be expressed as patterns, and that the applic...
Eli Tilevich, Godmar Back
ICALT
2005
IEEE
14 years 2 months ago
Learning Units Design Based in Grid Computing
: The development of cooperative, flexible and reusable learning environments is a need in modern education. The IMS Learning Design specification has played a very important role ...
Leonel Iriarte Navarro, Manuel Marco Such, Alexand...
EDBT
2010
ACM
156views Database» more  EDBT 2010»
13 years 12 months ago
Pattern detector: fast detection of suspicious stream patterns for immediate reaction
Detecting emerging problems in information and manufacturing systems is the goal of monitoring tools. Good and timely detection of problematic conditions from measured indicators ...
Ira Assent, Hardy Kremer, Stephan Günnemann, ...