Sciweavers

6147 search results - page 14 / 1230
» Requirements, Architectures and Risks
Sort
View
MOBICOM
2005
ACM
14 years 4 months ago
Architecture and evaluation of an unplanned 802.11b mesh network
This paper evaluates the ability of a wireless mesh architecture to provide high performance Internet access while demanding little deployment planning or operational management. ...
John C. Bicket, Daniel Aguayo, Sanjit Biswas, Robe...
ATAL
2004
Springer
14 years 4 months ago
Risk Management Methods for Speculative Actions
In multiagent systems, a cooperative action requires a mutual agreement among multiple agents and the agreement is generally reached by exchanging messages between them, but the d...
Yasuhiko Kitamura, Takuya Murao
JCS
2007
103views more  JCS 2007»
13 years 10 months ago
Risk management for distributed authorization
Distributed authorization takes into account several elements, including certificates that may be provided by non-local actors. While most trust management systems treat all asse...
Christian Skalka, Xiaoyang Sean Wang, Peter C. Cha...
MIDDLEWARE
2004
Springer
14 years 4 months ago
Security requirements in service oriented architectures for ubiquitous computing
This work presents a detailed analysis of the security requirements for Service Oriented Architecture in mobile computing, still missing in the current literature. The purpose of ...
Domenico Cotroneo, Almerindo Graziano, Stefano Rus...
CLEIEJ
2006
169views more  CLEIEJ 2006»
13 years 11 months ago
Tailoring RUP for LMS Selection: A Case Study
Learning Management System (LMS) development has become a high priority project for educational institutions and organizations, as it provides the virtual environment for online e...
Luis Eduardo Mendoza, María A. Pérez...