Sciweavers

443 search results - page 46 / 89
» Deploying research technology in the home
Sort
View
IEEEIAS
2007
IEEE
14 years 2 months ago
Modelling Quality of Protection in Outsourced Business Processes
There is a large number of research papers and standards dedicated to security for outsourced data. Yet, most papers propose new controls to access and protect the data rather tha...
Fabio Massacci, Artsiom Yautsiukhin
ISADS
1999
IEEE
14 years 23 days ago
Distributed Component-based Tailorability for CSCW Applications
Tailorability is generally regarded as a key property of groupware systems due to the dynamics and diversity of cooperative work. This article investigates the use of software com...
Oliver Stiemerling, Ralph Hinken, Armin B. Cremers
EUROSSC
2006
Springer
14 years 5 days ago
Toward Wide Area Interaction with Ubiquitous Computing Environments
Despite many years of ubiquitous computing (ubicomp) middleware research, deployment of such systems has not been widespread. We suggest this is in part because we lack a shared mo...
Michael Blackstock, Rodger Lea, Charles Krasic
FORTEST
2008
13 years 10 months ago
Model-Based Testing of Object-Oriented Reactive Systems with Spec Explorer
Testing is one of the costliest aspects of commercial software development. Model-based testing is a promising approach addressing these deficits. At Microsoft, model-based testin...
Margus Veanes, Colin Campbell, Wolfgang Grieskamp,...
CIKM
2010
Springer
13 years 6 months ago
Towards a data-centric view of cloud security
Cloud security issues have recently gained traction in the research community, with much of the focus primarily concentrated on securing the operating systems and virtual machines...
Wenchao Zhou, Micah Sherr, William R. Marczak, Zhu...