Sciweavers

4978 search results - page 889 / 996
» Logical models of argument
Sort
View
TMC
2012
13 years 6 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
TMC
2012
13 years 6 months ago
SenseLess: A Database-Driven White Spaces Network
The FCC ruling on Nov 4th, 2008 on white spaces has opened up the possibility of wireless network deployments over white spaces, i.e., vacant UHF TV channels. A key requirement fo...
Rohan Murty, Ranveer Chandra, Thomas Moscibroda, P...
ICDT
2009
ACM
248views Database» more  ICDT 2009»
16 years 5 months ago
Automatic verification of data-centric business processes
We formalize and study business process systems that are centered around "business artifacts", or simply "artifacts". This approach focuses on data records, kn...
Alin Deutsch, Richard Hull, Fabio Patrizi, Victor ...
WWW
2008
ACM
16 years 5 months ago
Better abstractions for secure server-side scripting
bstractions for Secure Server-Side Scripting Dachuan Yu Ajay Chander Hiroshi Inamura Igor Serikov DoCoMo Communications Laboratories USA 3240 Hillview Avenue Palo Alto, CA 94304 {y...
Dachuan Yu, Ajay Chander, Hiroshi Inamura, Igor Se...
WWW
2007
ACM
16 years 5 months ago
A framework for rapid integration of presentation components
The development of user interfaces (UIs) is one of the most timeconsuming aspects in software development. In this context, the lack of proper reuse mechanisms for UIs is increasi...
Boualem Benatallah, Fabio Casati, Florian Daniel, ...