Sciweavers

2669 search results - page 84 / 534
» Providing Contextual Information to Pervasive Computing Appl...
Sort
View
IFIPTCS
2010
13 years 5 months ago
A Semiring-Based Trace Semantics for Processes with Applications to Information Leakage Analysis
Abstract. We propose a framework for reasoning about program security building on language-theoretic and coalgebraic concepts. The behaviour of a system is viewed as a mapping from...
Michele Boreale, David Clark, Daniele Gorla
INFOCOM
2006
IEEE
14 years 1 months ago
Trust Evaluation in Anarchy: A Case Study on Autonomous Networks
— With the explosive growth of network techniques, in particular wireless communications, the traditional centralized, fixed networks can no longer satisfy the enormous demands ...
Tao Jiang, John S. Baras
ECIS
2003
13 years 9 months ago
Application of the theory of organized activity to the coordination of social information systems
Co-ordination is seen as a fundamental aspect of organisational activity where computers can help. This is motivated by the need to reconcile the conflicts that arise from the div...
José A. Moinhos Cordeiro, Joaquim Filipe
WWW
2007
ACM
14 years 8 months ago
Web4CE: accessing web-based applications on consumer devices
In a world where all devices will be interconnected, the boundaries between the different devices will start to disappear. Devices will be able to access each other's applica...
Walter Dees, Paul Shrubsole
MISQ
2000
104views more  MISQ 2000»
13 years 7 months ago
Understanding Computer-Mediated Discussions: Positivist and Interpretive Analyses of Group Support System Use
This research considers whether interpretive techniques can be used to enhance our understanding of computer-mediated discussions. The case study considered in this research is th...
Eileen M. Trauth, Leonard M. Jessup