Sciweavers

1988 search results - page 304 / 398
» Securing Information Transfer in Distributed Computing Envir...
Sort
View
WETICE
1995
IEEE
14 years 15 days ago
Subdocument invocation semantics in collaborative hyperdocuments
In this paper we informally explain a new Trellis model that incorporates colored tokens into the previouslydescribed timed-Petri-net-based de nition. We give examples of using Tr...
Richard Furuta, Jaime Navon, P. David Stotts
SEKE
2004
Springer
14 years 2 months ago
Application Semiotics Engineering Process
As application semantics becomes more complex and dynamic in IT systems, it is necessary to engineer the application semantics in its own lifecycle of development parallel to syste...
Gang Zhao
MOBISYS
2007
ACM
14 years 8 months ago
SmokeScreen: flexible privacy controls for presence-sharing
Presence-sharing is an emerging platform for mobile applications, but presence-privacy remains a challenge. Privacy controls must be flexible enough to allow sharing between both ...
Landon P. Cox, Angela Dalton, Varun Marupadi
GI
2003
Springer
14 years 2 months ago
Policy Based Management for Critical Infrastructure Protection
: Our current societies are fully dependent on large complex critical infrastructures (LCCIs). These LCCIs are large scale distributed systems that are highly interdependent, both ...
Gwendal Le Grand, Franck Springinsfeld, Michel Rig...
ATAL
2004
Springer
14 years 2 months ago
Framework to Control Emergent Survivability of Multi Agent Systems
As the science of multi-agent systems matures, many developers are looking to deploy mission critical applications on distributed multi-agent systems (DMAS). Due to their distribu...
Aaron Helsinger, Karl Kleinmann, Marshall Brinn