Sciweavers

197 search results - page 28 / 40
» Access control in collaborative commerce
Sort
View
TOCHI
1998
89views more  TOCHI 1998»
13 years 9 months ago
Using Metalevel Techniques in a Flexible Toolkit for CSCW Applications
Ideally, software toolkits for collaborative applications should provide generic, reusable components, applicable in a wide range of circumstances, which software developers can as...
Paul Dourish
EMSOFT
2006
Springer
14 years 1 months ago
Modeling a system controller for timing analysis
Upper bounds on worst-case execution times, which are commonly called WCET, are a prerequisite for validating the temporal correctness of tasks in a real-time system. Due to the e...
Stephan Thesing
IEEEARES
2010
IEEE
14 years 4 months ago
External Insider Threat: A Real Security Challenge in Enterprise Value Webs
—Increasingly, organizations collaborate with other organizations in value webs with various arrangements, such as outsourcing, partnering, joint ventures, or subcontracting. As ...
Virginia N. L. Franqueira, André van Cleeff...
IJET
2008
95views more  IJET 2008»
13 years 8 months ago
Supporting life-long competence development using the TENCompetence infrastructure: a first experiment
This paper describes an experiment to explore the effects of the TENCompetence infrastructure for supporting lifelong competence development which is now in development. This infra...
Judith Schoonenboom, Henk Sligte, Ayman Moghnieh, ...
DRM
2005
Springer
14 years 3 months ago
Hybrid static-dynamic attacks against software protection mechanisms
Advances in reverse engineering and program analyses have made software extremely vulnerable to malicious host attacks. These attacks typically take the form of intellectual prope...
Matias Madou, Bertrand Anckaert, Bjorn De Sutter, ...