Sciweavers

COMPSAC
2001
IEEE
13 years 11 months ago
From Software Architecture to Implementation with UML
Christine Hofmeister, Robert L. Nord
COMPSAC
2001
IEEE
13 years 11 months ago
Certificate Based Authorization Simulation System
Using certificates for distributed authorizations in computer network systems has been discussed in the literature. However real implementations of the concept are rarely seen. In...
Jie Dai, Jim Alves-Foss
COMPSAC
2001
IEEE
13 years 11 months ago
Debunking some Common Misconceptions on E-Learning
The recent explosion in distance learning programs on the world-wide web has spawned a lively debate on the future and the potential of these programs. While distance learning wil...
Ugo A. Buy
COMPSAC
2001
IEEE
13 years 11 months ago
Designing Role Hierarchies for Access Control in Workflow Systems
he correspondence between the role abstraction in Role-based Access Control (RBAC) and the notion of organizational positions, it seems easy to construct role hierarchies. This is...
Reinhardt A. Botha, Jan H. P. Eloff
COMPSAC
2001
IEEE
13 years 11 months ago
Integrating White- and Black-Box Techniques for Class-Level Regression Testing
In recent years, several techniques have been proposed for class-level regression testing. Most of these techniques focus either on white- or black-box testing, although an integr...
Sami Beydeda, Volker Gruhn
COMPSAC
2001
IEEE
13 years 11 months ago
An Architectural Model for Service-Based Flexible Software
Keith H. Bennett, Jie Xu, Malcolm Munro, Zhuang Ho...
COMPGEOM
2001
ACM
13 years 11 months ago
Efficient and small representation of line arrangements with applications
This paper addresses the problem of lossy compression of arrangements. Given an arrangement of n lines in the plane, we show how to construct another arrangement consisting of man...
David P. Dobkin, Ayellet Tal
CODES
2001
IEEE
13 years 11 months ago
The TACO protocol processor simulation environment
Network hardware design is becoming increasingly challenging because more and more demands are put on network bandwidth and throughput requirements, and on the speed with which ne...
Seppo Virtanen, Johan Lilius