Sciweavers

1615 search results - page 78 / 323
» Dark application communities
Sort
View
ESWS
2006
Springer
15 years 8 months ago
Semantic Web Policies - A Discussion of Requirements and Research Issues
Policies are pervasive in web applications. They play crucial roles in enhancing security, privacy and usability of distributed services. There has been extensive research in the a...
Piero A. Bonatti, Claudiu Duma, Norbert E. Fuchs, ...
CCR
2008
79views more  CCR 2008»
15 years 4 months ago
CRAWDAD workshop 2007
Wireless network researchers are hungry for data about how real users, applications, and devices use real networks under real network conditions. CRAWDAD, the Community Resource f...
Jihwang Yeo, Tristan Henderson, David Kotz
ICDT
2009
ACM
121views Database» more  ICDT 2009»
15 years 2 months ago
Automatic verification of database-driven systems: a new frontier
We describe a novel approach to verification of software systems centered around an underlying database. Instead of applying general-purpose techniques with only partial guarantee...
Victor Vianu
175
Voted
ICSE
2009
IEEE-ACM
15 years 2 months ago
Fourth international workshop on sharing and reusing architectural knowledge (SHARK 2009)
Architectural knowledge has been recognized by the software architecture community as a self-contained research area in software architecture, and brought along some promising res...
Patricia Lago, Paris Avgeriou, Philippe Kruchten
INFOCOM
2012
IEEE
13 years 6 months ago
Di-Sec: A distributed security framework for heterogeneous Wireless Sensor Networks
Wireless Sensor Networks (WSNs) are no longer a nascent technology and today, they are actively deployed as a viable technology in many diverse application domains such as health ...
Marco Valero, Sang Shin Jung, A. Selcuk Uluagac, Y...