Sciweavers

3899 search results - page 754 / 780
» Argumentation for Access Control
Sort
View
ESCIENCE
2006
IEEE
13 years 11 months ago
Scientific Workflows: More e-Science Mileage from Cyberinfrastructure
We view scientific workflows as the domain scientist's way to harness cyberinfrastructure for e-Science. Domain scientists are often interested in "end-to-end" fram...
Bertram Ludäscher, Shawn Bowers, Timothy M. M...
HIPC
2000
Springer
13 years 11 months ago
A Weight Based Distributed Clustering Algorithm for Mobile ad hoc Networks
In this paper, we propose a distributed clustering algorithm for a multi-hop packet radio network. These types of networks, also known as ad hoc networks, are dynamic in nature due...
Mainak Chatterjee, Sajal K. Das, Damla Turgut
ICSE
2000
IEEE-ACM
13 years 11 months ago
Software engineering for security: a roadmap
Is there such a thing anymore as a software system that doesn't need to be secure? Almost every softwarecontrolled system faces threats from potential adversaries, from Inter...
Premkumar T. Devanbu, Stuart G. Stubblebine
GECCO
2010
Springer
192views Optimization» more  GECCO 2010»
13 years 11 months ago
Resource abundance promotes the evolution of public goods cooperation
Understanding the evolution of cooperation as part of an evolutionary stable strategy (ESS) is a difficult problem that has been the focus of much work. The associated costs of co...
Brian D. Connelly, Benjamin E. Beckmann, Philip K....
MOBISYS
2010
ACM
13 years 10 months ago
PRISM: platform for remote sensing using smartphones
To realize the potential of opportunistic and participatory sensing using mobile smartphones, a key challenge is ensuring the ease of developing and deploying such applications, w...
Tathagata Das, Prashanth Mohan, Venkata N. Padmana...