Sciweavers

575 search results - page 47 / 115
» A Trust Analysis Methodology for Pervasive Computing Systems
Sort
View
CHI
2011
ACM
12 years 11 months ago
Improving the safety of homeless young people with mobile phones: values, form and function
By their pervasiveness and by being worn on our bodies, mobile phones seem to have become intrinsic to safety. To examine this proposition, 43 participants, from four stakeholder ...
Jill Palzkill Woelfer, Amy Iverson, David G. Hendr...
SACMAT
2011
ACM
12 years 10 months ago
xDAuth: a scalable and lightweight framework for cross domain access control and delegation
Cross domain resource sharing and collaborations have become pervasive in today’s service oriented organizations. Existing approaches for the realization of cross domain access ...
Masoom Alam, Xinwen Zhang, Kamran Khan, Gohar Ali
FDL
2005
IEEE
14 years 1 months ago
Synthesis for Unified Control- and Data-Oriented Models
In the Software/Hardware Engineering model-driven design methodology, preservation of real-time system properties can be guaranteed in the model synthesis up to a small time-deviat...
Oana Florescu, Jeroen Voeten, Henk Corporaal
IFIP
2000
Springer
13 years 11 months ago
Process as Theory in Information Systems Research
Many researchers have searched for evidence of organizational improvements from the huge sums invested in ICT. Unfortunately, evidence for such a pay back is spotty at best (e.g.,...
Kevin Crowston
DATE
2010
IEEE
192views Hardware» more  DATE 2010»
14 years 24 days ago
PhoenixSim: A simulator for physical-layer analysis of chip-scale photonic interconnection networks
—Recent developments have shown the possibility of leveraging silicon nanophotonic technologies for chip-scale interconnection fabrics that deliver high bandwidth and power effi...
Johnnie Chan, Gilbert Hendry, Aleksandr Biberman, ...