Sciweavers

1627 search results - page 225 / 326
» On context in authorization policy
Sort
View
INFOCOM
2005
IEEE
14 years 2 months ago
On the effectiveness of DDoS attacks on statistical filtering
— Distributed Denial of Service (DDoS) attacks pose a serious threat to service availability of the victim network by severely degrading its performance. Recently, there has been...
Qiming Li, Ee-Chien Chang, Mun Choon Chan
ATAL
2005
Springer
14 years 2 months ago
OWL-P: OWL for protocol and processes
We describe OWL-P (OWL for Processes and Protocols), a methodology and software tool for specifying and enacting interaction protocols among autonomous agents. We use the Web Onto...
Ashok U. Mallya, Nirmit Desai, Amit K. Chopra, Mun...
IQIS
2004
ACM
14 years 2 months ago
A Framework for Analysis of Data Freshness
Data freshness has been identified as one of the most important data quality attributes in information systems. This importance increases particularly in the context of distribute...
Mokrane Bouzeghoub, Verónika Peralta
PDC
2004
ACM
14 years 2 months ago
The weight of space: participatory design research for configuring habitable space for new arrival women in Hong Kong
When arriving to Hong Kong from China, the first difficulty of the new arrival women of the grassroots class is usually environmental stress. Their socio-economic situations often...
Jackie Yan-Chi Kwok
SELMAS
2004
Springer
14 years 2 months ago
Systematic Integration Between Requirements and Architecture
Software systems of today are characterized by the increasing size, complexity, distribution and heterogeneity. Understanding and supporting the interaction between software requi...
Lúcia R. D. Bastos, Jaelson Brelaz de Castr...