Sciweavers

213 search results - page 15 / 43
» diagrams 2004
Sort
View
DBSEC
2004
170views Database» more  DBSEC 2004»
13 years 9 months ago
RBAC/MAC Security Analysis and Design for UML
In software construction, analysis investigates the boundary of a system (scope and requirements), its usage and access, and from a security perspective, who needs access to what ...
Thuong Doan, Steven A. Demurjian, Charles E. Phill...
ER
2004
Springer
246views Database» more  ER 2004»
14 years 28 days ago
Data Mapping Diagrams for Data Warehouse Design with UML
Abstract. In Data Warehouse (DW) scenarios, ETL (Extraction, Transformation, Loading) processes are responsible for the extraction of data from heterogeneous operational data sourc...
Sergio Luján-Mora, Panos Vassiliadis, Juan ...
PLDI
2004
ACM
14 years 29 days ago
Cloning-based context-sensitive pointer alias analysis using binary decision diagrams
This paper presents the first scalable context-sensitive, inclusionbased pointer alias analysis for Java programs. Our approach to context sensitivity is to create a clone of a m...
John Whaley, Monica S. Lam
RISE
2004
Springer
14 years 27 days ago
A Symbolic Model Checker for tccp Programs
In this paper, we develop a symbolic representation for timed concurrent constraint (tccp) programs, which can be used for defining a lightweight model–checking algorithm for re...
María Alpuente, Moreno Falaschi, Alicia Vil...
ESANN
2004
13 years 9 months ago
Input Space Bifurcation Manifolds of RNNs
We derive analytical expressions of local codim-1-bifurcations for a fully connected, additive, discrete-time RNN, where we regard the external inputs as bifurcation parameters. Th...
Robert Haschke, Jochen J. Steil