Sciweavers

1352 search results - page 76 / 271
» Designing Security Requirements Models Through Planning
Sort
View
126
Voted
PERCOM
2006
ACM
16 years 2 months ago
Developing a Model for Trust Management in Pervasive Devices
Pervasive devices interacting in open and dynamic spaces with each others require a mechanism that allows them acting autonomously in a secure way and protecting their resources. ...
Andrés Marín López, Daniel Di...
RE
2007
Springer
15 years 9 months ago
Secure and Dependable Patterns in Organizations: An Empirical Approach
Designing a secure and dependable system is not just a technical issue, it involves also a deep analysis of the organizational and the social environment in which the system will ...
Yudistira Asnar, Paolo Giorgini, Roberto Bonato, V...
149
Voted
JSAC
2007
180views more  JSAC 2007»
15 years 3 months ago
A Cross-Layer Approach for WLAN Voice Capacity Planning
— This paper presents an analytical approach to determining the maximum number of on/off voice flows that can be supported over a wireless local area network (WLAN), under a qua...
Yu Cheng, Xinhua Ling, Wei Song, Lin X. Cai, Weihu...
PSYCHNOLOGY
2006
70views more  PSYCHNOLOGY 2006»
15 years 3 months ago
Navigating Information Space: Web site design and lessons from the built environment
The Web is the archetypal information space but even on a well designed site it can be difficult to find all the information you need. It is impossible to design a site so that al...
David Benyon
VLDB
1995
ACM
129views Database» more  VLDB 1995»
15 years 6 months ago
A Cost Model for Clustered Object-Oriented Databases
Query processing is one of the most, critical issues in Object-Oriented DBMSs. Extensible opt,imizers with efficient, search strategies require a cost model to select the most eff...
Georges Gardarin, Jean-Robert Gruser, Zhao-Hui Tan...