Sciweavers

1352 search results - page 85 / 271
» Designing Security Requirements Models Through Planning
Sort
View
FMCO
2008
Springer
110views Formal Methods» more  FMCO 2008»
13 years 10 months ago
Reusable Architectural Decision Model for Model and Metadata Repositories
Models are gaining importance in software development, for instance in the MDD field, as well as in other disciplines such as biology and physics. Hence, tool support is needed to ...
Christine Mayr, Uwe Zdun, Schahram Dustdar
IADIS
2004
13 years 10 months ago
Business Environment Change and Service Platform Architecture Interconnection
There has been research on the areas of on-line and mobile service domains both in the business research discipline and the technology discipline. Some of the research has concent...
Kimmo Palletvuori
MOBIHOC
2005
ACM
14 years 8 months ago
Power balanced coverage-time optimization for clustered wireless sensor networks
We consider a wireless sensor network in which sensors are grouped into clusters, each with its own cluster head (CH). Each CH collects data from sensors in its cluster and relays...
Tao Shu, Marwan Krunz, Sarma B. K. Vrudhula
WSCG
2001
66views more  WSCG 2001»
13 years 10 months ago
Supporting the Search for the Optimal Location of Facilities
the problem of locating services in a given context requires a methematical abstraction so that its complexity can be managed by means of an iterative search through context simul...
Alberto Biancardi, R. De Lotto, Elena Ferrari
ESORICS
2004
Springer
14 years 2 months ago
Comparison Between Two Practical Mix Designs
We evaluate the anonymity provided by two popular email mix implementations, Mixmaster and Reliable, and compare their effectiveness through the use of simulations which model th...
Claudia Díaz, Len Sassaman, Evelyne Dewitte