Sciweavers

295 search results - page 26 / 59
» An Approach to Trust Management Challenges for Critical Infr...
Sort
View
PERCOM
2010
ACM
13 years 11 months ago
Adaptive deployment for pervasive data gathering in connectivity-challenged environments
—Some current and future pervasive data driven applications must operate in ”extreme” environments where endto-end connectivity cannot be guaranteed at all times. In fact, it...
Tahiry Razafindralambo, Nathalie Mitton, Aline Car...
ECUMN
2007
Springer
14 years 1 months ago
A PKI Approach Targeting the Provision of a Minimum Security Level within Internet
After decades of expansion, Internet became an essential tool useful for professionals and private individuals providing a large range of services like emailing, management of ban...
Maryline Laurent-Maknavicius
TON
2012
11 years 10 months ago
On New Approaches of Assessing Network Vulnerability: Hardness and Approximation
—Society relies heavily on its networked physical infrastructure and information systems. Accurately assessing the vulnerability of these systems against disruptive events is vit...
Thang N. Dinh, Ying Xuan, My T. Thai, Panos M. Par...
OTM
2010
Springer
13 years 5 months ago
Collaborative Coordination of Activities with Temporal Dependencies
Business process management and systems have been proven mature and highly beneficial in many domains. Recent surveys by leading market analysts say that the next challenge for BPM...
Jörn Franke, François Charoy, Paul El ...
IJAMC
2006
53views more  IJAMC 2006»
13 years 7 months ago
Exploring the situated context of knowledge management in e-government development
: In the past decade, knowledge management has played a critical and active role in business settings at the organisation level. Recently, the importance of knowledge management is...
Haiyan Huang, Benjamin Yeo, Eileen M. Trauth