Sciweavers

635 search results - page 46 / 127
» A Context-Sensitive Access Control Model and Prototype Imple...
Sort
View
DEBU
2008
100views more  DEBU 2008»
13 years 7 months ago
WAVE: Automatic Verification of Data-Driven Web Services
Data-driven Web services, viewed broadly as interactive systems available on the Web for users and programs, provide the backbone for increasingly complex Web applications. While ...
Alin Deutsch, Victor Vianu
COLCOM
2005
IEEE
14 years 1 months ago
Distributed floor control protocols for computer collaborative applications on overlay networks
— Computer supported collaborative applications on overlay networks are gaining popularity among users who are geographically dispersed. Examples of these kinds of applications i...
Shankar M. Banik, Sridhar Radhakrishnan, Tao Zheng...
EOR
2006
82views more  EOR 2006»
13 years 7 months ago
Flowshop scheduling research after five decades
: All information systems have to be protected. As the number of information objects and the number of users increase the task of information system's protection becomes more ...
Jatinder N. D. Gupta, Edward F. Stafford
HICSS
1999
IEEE
97views Biometrics» more  HICSS 1999»
13 years 12 months ago
The Ragnarok Architectural Software Configuration Management Model
The architecture is the fundamental framework for designing and implementing large scale software, and the ability to trace and control its evolution is essential. However, many t...
Henrik Bærbak Christensen
EUSAI
2004
Springer
13 years 11 months ago
Distance-Based Access Modifiers Applied to Safety in Home Networks
Home networks and the interconnection of home appliances is a classical theme in ubiquitous computing research. Security is a recurring concern, but there is a lack of awareness of...
Kjeld Høyer Mortensen, Kari R. Schougaard, ...