Sciweavers

571 search results - page 53 / 115
» On Exploiting System Dynamics Modeling to Identify Service R...
Sort
View
CF
2004
ACM
15 years 10 months ago
Modeling service-based multimedia content adaptation in pervasive computing
Pervasive computing applications allow users to access information from anywhere while traveling and using variety of devices. Heterogeneity and limitation of resources involved i...
Girma Berhe, Lionel Brunie, Jean-Marc Pierson
SIGSOFT
2003
ACM
16 years 5 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
ATAL
2008
Springer
15 years 6 months ago
Pan-supplier stock control in a virtual warehouse
We describe the commercial application of agents to the handling of catalogue and stock-control for the selling of books on the internet. The primary characteristic of the target ...
Emad El-Deen El-Akehal, Julian A. Padget
SUTC
2008
IEEE
15 years 11 months ago
Security Enforcement Model for Distributed Usage Control
Recently proposed usage control concept and models extend traditional access control models with features for contemporary distributed computing systems, including continuous acce...
Xinwen Zhang, Jean-Pierre Seifert, Ravi S. Sandhu
ADBIS
2006
Springer
131views Database» more  ADBIS 2006»
15 years 10 months ago
Anatomy of a Data Stream Management System
Abstract. In this paper, we identify issues and present solutions developed – both theoretical and experimental – during the course of developing a data stream management syste...
Qingchun Jiang, Sharma Chakravarthy