Sciweavers

209 search results - page 28 / 42
» Exploiting Information Relationships for Access Control
Sort
View
CAISE
2003
Springer
14 years 4 months ago
Goal-Oriented Requirements Engineering: A Case Study in E-government
This paper presents a requirements engineering framework based on the notions of Actor, Goal, and Intentional Dependency, and applies it to a case study in the field of Informatio...
Paolo Donzelli, Paolo Bresciani
WWW
2005
ACM
14 years 11 months ago
Online curriculum on the semantic Web: the CSD-UoC portal for peer-to-peer e-learning
Online Curriculum Portals aim to support networks of instructors and learners by providing a space of convergence for enhancing peer-to-peer learning interactions among individual...
Dimitris Kotzinos, Sofia Pediaditaki, Apostolos Ap...
ADHOC
2007
118views more  ADHOC 2007»
13 years 11 months ago
Sticky CSMA/CA: Implicit synchronization and real-time QoS in mesh networks
We propose a novel approach to QoS for real-time traffic over wireless mesh networks, in which application layer characteristics are exploited or shaped in the design of medium ac...
Sumit Singh, Prashanth Aravinda Kumar Acharya, Upa...
OZCHI
2006
ACM
14 years 4 months ago
Beyond security: implications for the future of federated digital identity management systems
Federated identity management is often viewed by corporations as a solution to support secure online commerce by synthesising complex and fragmented user information into a single...
Christine Satchell, Graeme G. Shanks, Steve Howard...
ICDE
2002
IEEE
163views Database» more  ICDE 2002»
15 years 4 days ago
Keyword Searching and Browsing in Databases using BANKS
With the growth of the Web, there has been a rapid increase in the number of users who need to access online databases without having a detailed knowledge of the schema or of quer...
Gaurav Bhalotia, Arvind Hulgeri, Charuta Nakhe, So...