Sciweavers

503 search results - page 51 / 101
» An Authoring Tool for User Generated Mobile Services
Sort
View
ESORICS
2002
Springer
14 years 8 months ago
TINMAN: A Resource Bound Security Checking System for Mobile Code
Resource security pertains to the prevention of unauthorized usage of system resources that may not directly cause corruption or leakage of information. A common breach of resource...
Aloysius K. Mok, Weijiang Yu
CHI
2005
ACM
14 years 9 months ago
Assessing differential usage of usenet social accounting meta-data
We describe a usage study of Netscan\Tech, a system that generates and publishes daily a range of social metrics across three dimensions: newsgroup, author, and thread, for a set ...
A. J. Bernheim Brush, Xiaoqing Wang, Tammara Combs...
ETFA
2005
IEEE
14 years 2 months ago
A security architecture for data privacy and security
Data access and software exchange are often achieved over insecure networks such as the public Internet. System designers are therefore forced to be proactive with regard to verif...
Alfred C. Weaver
BPM
2008
Springer
207views Business» more  BPM 2008»
13 years 10 months ago
From Personal Task Management to End-User Driven Business Process Modeling
The need to involve business users in process modeling is largely perceived in the context of Business Process Management systems. This can facilitate the elaboration of consistent...
Todor Stoitsev, Stefan Scheidl, Felix Flentge, Max...
AAAI
2000
13 years 10 months ago
The Systems Engineering Process Activities (SEPA) Methodology and Tool Suite
or cone, abstraction is chosen to represent a spectrum of user inputs/requirements that are narrowed, refined, and structured into a system design. User inputs require refinement f...
K. Suzanne Barber, Thomas J. Graser, Paul Grisham,...