Sciweavers

366 search results - page 49 / 74
» Access Policy Design Supported by FCA Methods
Sort
View
DATE
2009
IEEE
139views Hardware» more  DATE 2009»
14 years 3 months ago
Reliable mode changes in real-time systems with fixed priority or EDF scheduling
Abstract—Many application domains require adaptive realtime embedded systems that can change their functionality over time. In such systems it is not only necessary to guarantee ...
Nikolay Stoimenov, Simon Perathoner, Lothar Thiele
HICSS
2007
IEEE
116views Biometrics» more  HICSS 2007»
14 years 3 months ago
Fine-Grained and Scalable Approaches for Message Integrity
When we have multiple users compiling a single message, including shared contents, metadata, policy, and so on, the integrity of the contents created by individual users needs to ...
Joon S. Park, Ganesh Devarajan
ICWS
2007
IEEE
13 years 10 months ago
Search Algorithms for Discovery of Web Services
Web services are designed to standardize interactions between heterogeneous applications using Internet technologies. Within the framework of Internet search technologies, Web ser...
Janette Hicks, Madhusudhan Govindaraju, Weiyi Meng
MOBISYS
2008
ACM
14 years 8 months ago
Trustworthy and personalized computing on public kiosks
Many people desire ubiquitous access to their personal computing environments. We present a system in which a user leverages a personal mobile device to establish trust in a publi...
Scott Garriss, Ramón Cáceres, Stefan...
CORR
2007
Springer
146views Education» more  CORR 2007»
13 years 8 months ago
The Long Term Fate of Our Digital Belongings: Toward a Service Model for Personal Archives
We conducted a preliminary field study to understand the current state of personal digital archiving in practice. Our aim is to design a service for the long-term storage, preserv...
Catherine C. Marshall, Sara A. Bly, Francoise Brun...