Sciweavers

856 search results - page 30 / 172
» Design Guidance through the Controlled Application of Constr...
Sort
View
COMPSAC
2010
IEEE
13 years 7 months ago
Representing and Reasoning about Web Access Control Policies
The advent of emerging technologies such as Web services, service-oriented architecture, and cloud computing has enabled us to perform business services more efficiently and effect...
Gail-Joon Ahn, Hongxin Hu, Joohyung Lee, Yunsong M...
SNPD
2008
13 years 10 months ago
Aggregate Congestion Control for Peer-to-Peer File Sharing Applications
Peer-to-Peer file sharing applications, which enable peers to establish multiple TCP connections between other peers to transfer data, pose new challenge to congestion control. Si...
Wei Li, Shanzhi Chen, Yaning Liu, Xin Li
ICDCSW
2008
IEEE
14 years 3 months ago
RETROFIT: Reliable Exchanges through Resilient Overlays for Internet Teleoperation
Emergence of successful teleoperation applications requires the convergence of diverse domains like robotics, machine learning, sensing, actuation, control and communication. We e...
Invited Talk Lakshamanan, Raj Rajkumar
HASE
2007
IEEE
14 years 29 days ago
Goal-Oriented Patterns for UML-Based Modeling of Embedded Systems Requirements
Embedded systems are used for critical applications that must adhere to safety constraints. Developers of these systems face three key challenges when attempting to apply existing...
Heather Goldsby, Sascha Konrad, Betty H. C. Cheng
EUC
2008
Springer
13 years 11 months ago
Analyzing Privacy Designs of Mobile Social Networking Applications
The combined advances of open mobile platforms and online social networking applications (SNAs) are driving pervasive computing to the real-world users, as the mobile SNAs are exp...
Guanling Chen, Faruq Rahman