Sciweavers

7762 search results - page 83 / 1553
» Availability in BitTorrent Systems
Sort
View
ICOIN
2005
Springer
14 years 1 months ago
Experience with Engineering a Network Forensics System
Network Forensics is an important extension to the model of network security where emphasis is traditionally put on prevention and to a lesser extent on detection. It focuses on th...
Ahmad Almulhem, Issa Traoré
DEXAW
1999
IEEE
94views Database» more  DEXAW 1999»
14 years 12 days ago
Reuse, Validation and Verification of System Development Processes
The wide variety of abstract system development methodologies available includes the waterfall and V models. These models are often too generic and need careful adaptation to suit ...
Peter J. Funk, Ivica Crnkovic
CSCW
2008
ACM
13 years 10 months ago
Understanding the implications of social translucence for systems supporting communication at work
In this paper we describe a study that explored the implications of the Social Translucence framework for designing systems that support communications at work. Two systems design...
Agnieszka Matysiak Szóstek, Evangelos Karap...
PST
2008
13 years 9 months ago
AttributeTrust A Framework for Evaluating Trust in Aggregated Attributes via a Reputation System
To enable a rich attribute-based authorization system, it is desirable that a large number of user attributes are available, possibly provided by multiple entities. The user may b...
Apurva Mohan, Douglas M. Blough
AML
2004
90views more  AML 2004»
13 years 8 months ago
A comparison of two systems of ordinal notations
The standard method of generating countable ordinals from uncountable ordinals can be replaced by a use of fixed point extractors available in the term calculus of Howard's s...
Harold Simmons