Sciweavers

1600 search results - page 164 / 320
» Problem-solving in open environments
Sort
View
JCP
2007
103views more  JCP 2007»
13 years 9 months ago
Conformance Testing a Set of Criteria for Assessing Trust
—The ability to authenticate the identity of an entity in an open and insecure environment such as the Internet plays an important role in reducing potential threats and Public k...
Omar Batarfi, Lindsay Marshall
ENTCS
2007
139views more  ENTCS 2007»
13 years 9 months ago
A Change-based Approach to Software Evolution
Software evolution research is limited by the amount of information available to researchers: Current version control tools do not store all the information generated by developer...
Romain Robbes, Michele Lanza
MTA
2002
103views more  MTA 2002»
13 years 8 months ago
STEPS: Supporting Traditional Education Procedures-A TCP/IP Multimedia Networks-Based Model
This paper describes an integrated model for the realization of an Open and Distance Learning (ODL) environment supporting traditional learning procedures, through collaborative le...
Christos Bouras, Petros Lampsas, Paul G. Spirakis
CCGRID
2010
IEEE
13 years 6 months ago
File-Access Characteristics of Data-Intensive Workflow Applications
This paper studies five real-world data intensive workflow applications in the fields of natural language processing, astronomy image analysis, and web data analysis. Data intensiv...
Takeshi Shibata, SungJun Choi, Kenjiro Taura
COMPSAC
2001
IEEE
14 years 25 days ago
Certificate Based Authorization Simulation System
Using certificates for distributed authorizations in computer network systems has been discussed in the literature. However real implementations of the concept are rarely seen. In...
Jie Dai, Jim Alves-Foss