Sciweavers

1436 search results - page 207 / 288
» Language Support for Managing Variability in Architectural M...
Sort
View
SP
2007
IEEE
137views Security Privacy» more  SP 2007»
14 years 2 months ago
A Cryptographic Decentralized Label Model
Information-flow security policies are an appealing way of specifying confidentiality and integrity policies in information systems. Most previous work on language-based securit...
Jeffrey A. Vaughan, Steve Zdancewic
GROUP
2003
ACM
14 years 1 months ago
Concepts for usable patterns of groupware applications
Patterns, which are based on in-depth practical experience, can be instructing for the design of groupware applications as sociotechnical systems. On the basis of a summary of the...
Thomas Herrmann, Marcel Hoffmann, Isa Jahnke, Andr...
APNOMS
2006
Springer
13 years 11 months ago
"P4L": A Four Layers P2P Model for Optimizing Resources Discovery and Localization
Peer-to-Peer systems are based on the concept of resources localization and mutualization in dynamic context. In specific environment such as mobile networks, characterized by high...
Mourad Amad, Ahmed Meddahi
FLAIRS
2008
13 years 10 months ago
Conditional and Composite Constraints with Preferences
Preferences in constraint problems are common but significant in many real world applications. In this paper, we extend our conditional and composite CSP (CCCSP) framework, managi...
Malek Mouhoub, Amrudee Sukpan
DSRT
2005
IEEE
14 years 1 months ago
Using Web Services and Data Mediation/Storage Services to Enable Command and Control to Simulation Interoperability
The Extensible Battle Management Language project has implemented XML based data mediation services to translate from legacy XML schemas into XML schemas, based on a common tag se...
Andreas Tolk, J. Mark Pullen