Sciweavers

135 search results - page 9 / 27
» Idea: Trusted Emergency Management
Sort
View
EUSFLAT
2003
13 years 10 months ago
Fuzzy logic techniques for reputation management in anonymous peer-to-peer systems
Emerging approaches to enforce some form of protection in (pseudo)anonymous peer to peer systems propose the use of reputations as a means to establish the reliability of servents...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
SAINT
2007
IEEE
14 years 2 months ago
Privacy Management for Context Transponders
While by now feasible solutions to protect privacy for complex ubiquitous applications are available, very small devices, called context transponders (CTP) still lack resources to...
Michael Fahrmair, Wassiou Sitou, Bernd Spanfelner
WETICE
1999
IEEE
14 years 25 days ago
Replacing Copies with Connections: Managing Software across the Virtual Organization
The Internet, the World Wide Web, JavaTM technology, and software components are changing the software business. Activities traditionally constrained by the need for intense infor...
Tobias Murer, Michael L. Van de Vanter
ICSE
2003
IEEE-ACM
14 years 8 months ago
The Grand Challenge of Trusted Components
Reusable components equipped with strict guarantees of quality can help reestablish software development on a stronger footing, by taking advantage of the scaling effect of reuse ...
Bertrand Meyer
ESWA
2006
123views more  ESWA 2006»
13 years 8 months ago
Development of a knowledge management initiative and system: A case study
As knowledge emerges as the primary strategic resource in the 21st century, many firms in the manufacturing and service sectors alike are beginning to introduce and implement Know...
Kuan Yew Wong, Elaine Aspinwall