Sciweavers

2270 search results - page 229 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
152
Voted
AOSE
2005
Springer
15 years 10 months ago
Zooming Multi-Agent Systems
Abstract Complex systems call for a hierarchical description. Analogously, the engineering of non-trivial MASs (multiagent systems) requires principles and mechanisms for a multi-l...
Ambra Molesini, Andrea Omicini, Alessandro Ricci, ...
SAC
2004
ACM
15 years 10 months ago
Towards a flexible, process-oriented IT architecture for an integrated healthcare network
Healthcare information systems play an important role in improving healthcare quality. As providing healthcare increasingly changes from isolated treatment episodes towards a cont...
Mario Beyer, Klaus Kuhn, Christian Meiler, Stefan ...
MSWIM
2006
ACM
15 years 10 months ago
Performance modeling of critical event management for ubiquitous computing applications
A generic theoretical framework for managing critical events in ubiquitous computing systems is presented. The main idea is to automatically respond to occurrences of critical eve...
Tridib Mukherjee, Krishna M. Venkatasubramanian, S...
143
Voted
ESORICS
2008
Springer
15 years 6 months ago
Sharemind: A Framework for Fast Privacy-Preserving Computations
Gathering and processing sensitive data is a difficult task. In fact, there is no common recipe for building the necessary information systems. In this paper, we present a provably...
Dan Bogdanov, Sven Laur, Jan Willemson
139
Voted
MSWIM
2005
ACM
15 years 10 months ago
Sensor-assisted wi-fi indoor location system for adapting to environmental dynamics
Wi-Fi based indoor location systems have been shown to be both cost-effective and accurate, since they can attain meter-level positioning accuracy by using existing Wi-Fi infrastr...
Yi-Chao Chen, Ji-Rung Chiang, Hao-Hua Chu, Polly H...