Sciweavers

7694 search results - page 1360 / 1539
» An Implementation of an Applicative File System
Sort
View
128
Voted
PERCOM
2006
ACM
16 years 3 months ago
Composition Trust Bindings in Pervasive Computing Service Composition
In pervasive computing, devices or peers may implement or compose services using services from other devices or peers, and may use components from various sources. A composition t...
John Buford, Rakesh Kumar, Greg Perkins
127
Voted
HICSS
2009
IEEE
105views Biometrics» more  HICSS 2009»
15 years 10 months ago
The Visual Wiki: A New Metaphor for Knowledge Access and Management
Successful knowledge management results in a competitive advantage in today’s information- and knowledge-rich industries. The elaboration and integration of emerging web-based t...
Christian Hirsch, John G. Hosking, John C. Grundy,...
CSMR
2009
IEEE
15 years 10 months ago
Static Security Analysis Based on Input-Related Software Faults
It is important to focus on security aspects during the development cycle to deliver reliable software. However, locating security faults in complex systems is difficult and ther...
Csaba Nagy, Spiros Mancoridis
144
Voted
GLOBECOM
2009
IEEE
15 years 10 months ago
QOMB: A Wireless Network Emulation Testbed
—In this paper we present QOMB, a testbed we designed and implemented for the evaluation of wireless network systems, protocols and applications. The testbed uses the wireless ne...
Razvan Beuran, Lan Tien Nguyen, Toshiyuki Miyachi,...
140
Voted
ICC
2009
IEEE
130views Communications» more  ICC 2009»
15 years 10 months ago
Flexible Single Sign-On for SIP: Bridging the Identity Chasm
—Identity federation is a key requirement for today’s distributed services. This technology allows managed sharing of users’ identity information between identity providers (...
Pin Nie, Juha-Matti Tapio, Sasu Tarkoma, Jani Heik...
« Prev « First page 1360 / 1539 Last » Next »