Sciweavers

7762 search results - page 83 / 1553
» Availability in BitTorrent Systems
Sort
View
ICOIN
2005
Springer
15 years 8 months ago
Experience with Engineering a Network Forensics System
Network Forensics is an important extension to the model of network security where emphasis is traditionally put on prevention and to a lesser extent on detection. It focuses on th...
Ahmad Almulhem, Issa Traoré
DEXAW
1999
IEEE
94views Database» more  DEXAW 1999»
15 years 7 months ago
Reuse, Validation and Verification of System Development Processes
The wide variety of abstract system development methodologies available includes the waterfall and V models. These models are often too generic and need careful adaptation to suit ...
Peter J. Funk, Ivica Crnkovic
CSCW
2008
ACM
15 years 5 months ago
Understanding the implications of social translucence for systems supporting communication at work
In this paper we describe a study that explored the implications of the Social Translucence framework for designing systems that support communications at work. Two systems design...
Agnieszka Matysiak Szóstek, Evangelos Karap...
PST
2008
15 years 4 months ago
AttributeTrust A Framework for Evaluating Trust in Aggregated Attributes via a Reputation System
To enable a rich attribute-based authorization system, it is desirable that a large number of user attributes are available, possibly provided by multiple entities. The user may b...
Apurva Mohan, Douglas M. Blough
AML
2004
90views more  AML 2004»
15 years 3 months ago
A comparison of two systems of ordinal notations
The standard method of generating countable ordinals from uncountable ordinals can be replaced by a use of fixed point extractors available in the term calculus of Howard's s...
Harold Simmons