Sciweavers

274 search results - page 41 / 55
» Developing a Model for Trust Management in Pervasive Devices
Sort
View
UIST
1996
ACM
13 years 11 months ago
Using the Multi-Layer Model for Building Interactive Graphical Applications
Most interactive graphical applications that use direct manipulation are built with low-level libraries such as Xlib because the graphic and interaction models of higher-level too...
Jean-Daniel Fekete, Michel Beaudouin-Lafon
CONCURRENCY
2008
104views more  CONCURRENCY 2008»
13 years 7 months ago
PERMIS: a modular authorization infrastructure
Authorization infrastructures manage privileges and render access control decisions, allowing applications to adjust their behavior according to the privileges allocated to users....
David W. Chadwick, Gansen Zhao, Sassa Otenko, Roma...
ISSRE
2005
IEEE
14 years 1 months ago
Safety Analysis of Software Product Lines Using State-Based Modeling
The difficulty of managing variations and their potential interactions across an entire product line currently hinders safety analysis in safety-critical, software product lines. ...
Jing Liu, Josh Dehlinger, Robyn R. Lutz
IJMI
2007
134views more  IJMI 2007»
13 years 7 months ago
Investigating risk exposure in e-health systems
: The increasing dependency being placed on electronic health information systems presents new challenges for today’s health managers and systems developers. This paper uses Elec...
Peter R. Croll, Jasmine Croll
JSAC
2007
105views more  JSAC 2007»
13 years 7 months ago
What and how much to gain by spectrum agility?
— Static spectrum allocation prohibits radio devices from using spectral bands designated for others. As a result, some bands are under-utilized while other bands are over-popula...
Chun-Ting Chou, Sai Shankar N., Hyoil Kim, Kang G....