Sciweavers

1735 search results - page 323 / 347
» Using UML for Business Object Based Systems Modeling
Sort
View
DRM
2003
Springer
15 years 7 months ago
Experiences with the enforcement of access rights extracted from ODRL-based digital contracts
In this paper, we present our experiences concerning the enforcement of access rights extracted from ODRL-based digital contracts. We introduce the generalized Contract Schema (Co...
Susanne Guth, Gustaf Neumann, Mark Strembeck
DSP
2008
15 years 28 days ago
On statistical approaches to target silhouette classification in difficult conditions
In this paper we present a methodical evaluation of the performance of a new and two traditional approaches to automatic target recognition (ATR) based on silhouette representatio...
Conrad Sanderson, Danny Gibbins, Stephen Searle
DEON
2008
Springer
15 years 4 months ago
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Nora Cuppens-Boulahia, Frédéric Cupp...
ISMB
1998
15 years 3 months ago
Advanced Query Mechanisms for Biological Databases
Existing query interfaces for biological databases are either based on fixed forms or textual query languages. Users of a fixed form-based query interface are limited to performin...
I-Min A. Chen, Anthony Kosky, Victor M. Markowitz,...
100
Voted
ICFP
2003
ACM
16 years 2 months ago
A user-centred approach to functions in Excel
We describe extensions to the Excel spreadsheet that integrate userdefined functions into the spreadsheet grid, rather than treating them as a "bolt-on". Our first objec...
Simon L. Peyton Jones, Alan F. Blackwell, Margaret...