Sciweavers

577 search results - page 71 / 116
» Engineering Sufficiently Secure Computing
Sort
View
124
Voted
COMPGEOM
2008
ACM
15 years 4 months ago
Discrete laplace operator on meshed surfaces
In recent years a considerable amount of work in graphics and geometric optimization used tools based on the Laplace-Beltrami operator on a surface. The applications of the Laplac...
Mikhail Belkin, Jian Sun, Yusu Wang
141
Voted
PDC
2004
ACM
15 years 8 months ago
Lost in translation: a critical analysis of actors, artifacts, agendas, and arenas in participatory design
As computer technologies start to permeate the everyday activities of a continuously growing population, social and technical as well as political and legal issues will surface. P...
Rogério De Paula
106
Voted
ICSE
2004
IEEE-ACM
16 years 2 months ago
GlueQoS: Middleware to Sweeten Quality-of-Service Policy Interactions
A holy grail of component-based software engineering is "write-once, reuse everywhere". However, in modern distributed, component-based systems supporting emerging appli...
Eric Wohlstadter, Stefan Tai, Thomas A. Mikalsen, ...
133
Voted
EUROPAR
2004
Springer
15 years 8 months ago
Databases, Workflows and the Grid in a Service Oriented Environment
As the Grid moves towards adopting a service-oriented architecture built on Web services, coupling between processes will rely on secure, reliable, and transacted messages and be s...
Zhuoan Jiao, Jasmin L. Wason, Wenbin Song, Fenglia...
114
Voted
IDTRUST
2009
ACM
15 years 9 months ago
Usable trust anchor management
Security in browsers is based upon users trusting a set of root Certificate Authorities (called Trust Anchors) which they may know little or nothing about. Browser vendors face a...
Massimiliano Pala, Scott A. Rea