Sciweavers

713 search results - page 125 / 143
» An Integrated Framework for Security and Dependability
Sort
View
DS
1997
104views Database» more  DS 1997»
13 years 8 months ago
Managing Constraint Violations in Administrative Information Systems
This paper motivates a comprehensive methodological framework for dealing with some aspects of real-world complexity in information system analysis and design. By complex applicat...
I. Boydens, Alain Pirotte, Esteban Zimányi
IJNSEC
2007
157views more  IJNSEC 2007»
13 years 7 months ago
Balancing Trust and Incentive in Peer-to-Peer Collaborative System
In order to maximize resource utilization as well as providing trust management in P2P computing environments, we propose a novel framework - Trust-Incentive Service Management (T...
Yu Zhang, Li Lin, Jinpeng Huai
CORR
2011
Springer
221views Education» more  CORR 2011»
13 years 2 months ago
Course on System Design (structural approach)
—The article describes a course on system design (structural approach) which involves the following: issues of systems engineering; structural models; basic technological problem...
Mark Sh. Levin
TCSV
2010
13 years 2 months ago
Object Tracking in Structured Environments for Video Surveillance Applications
Abstract--We present a novel tracking method for effectively tracking objects in structured environments. The tracking method finds applications in security surveillance, traffic m...
Junda Zhu, Yuanwei Lao, Yuan F. Zheng
BIRTHDAY
2008
Springer
13 years 9 months ago
SPREADSPACES: Mathematically-Intelligent Graphical Spreadsheets
Abstract. Starting from existing spreadsheet software, like Lotus 1-23R , ExcelR , or Spreadsheet 2000R , we propose a sequence of enhancements to fully integrate constraint-based ...
Nachum Dershowitz, Claude Kirchner