Sciweavers

902 search results - page 37 / 181
» Opening Address
Sort
View
CHI
2007
ACM
14 years 9 months ago
Task and social visualization in software development: evaluation of a prototype
As open source development has evolved, differentiation of roles and increased sophistication of collaborative processes has occurred. Recently, we described coordination issues i...
Jason B. Ellis, Shahtab Wahid, Catalina Danis, Wen...
IEEEARES
2008
IEEE
14 years 3 months ago
Improving Techniques for Proving Undecidability of Checking Cryptographic Protocols
Existing undecidability proofs of checking secrecy of cryptographic protocols have the limitations of not considering protocols common in literature, which are in the form of comm...
Zhiyao Liang, Rakesh M. Verma
DALT
2004
Springer
14 years 2 months ago
A Protocol for Resource Sharing in Norm-Governed Ad Hoc Networks
Ad hoc networks may be viewed as computational systems whose members may fail to, or choose not to, comply with the rules governing their behaviour. We are investigating to what ex...
Alexander Artikis, Lloyd Kamara, Jeremy Pitt, Mare...
CCS
2000
ACM
14 years 1 months ago
Implementing a distributed firewall
Conventional firewalls rely on topology restrictions and controlled network entry points to enforce traffic filtering. Furthermore, a firewall cannot filter traffic it does ...
Sotiris Ioannidis, Angelos D. Keromytis, Steven M....
ELPUB
2007
ACM
14 years 17 days ago
EPrints 3.0: New Capabilities for Maturing Repositories
There are now a large number of repositories in the world, contributing a significant amount of content to the world's scholars and scientists. The landscape has changed sinc...
Leslie Carr