Sciweavers

591 search results - page 30 / 119
» Securing the Broker Pattern
Sort
View
SSS
2009
Springer
163views Control Systems» more  SSS 2009»
14 years 3 months ago
Developing Autonomic and Secure Virtual Organisations with Chemical Programming
This paper studies the development of autonomic and secure Virtual Organisations (VOs) when following the chemical-programming paradigm. We have selected the Higher-Order Chemical ...
Alvaro E. Arenas, Jean-Pierre Banâtre, Thier...
EUPROJECTS
2006
Springer
14 years 9 days ago
Applying the MVC Pattern to Generated User Interfaces with a Focus on Audio
The mobile user can interact with devices in the environment using either the devices themselves or a device she carries with her. This requires an adaption of the user interface t...
Dirk Schnelle, Tobias Klug
SOUPS
2009
ACM
14 years 3 months ago
The impact of privacy indicators on search engine browsing patterns
Laboratory studies have shown that when online search engines’ results are annotated with privacy indicators, some consumers will pay a premium to make purchases from sites that...
Janice Y. Tsai, Serge Egelman, Lorrie Faith Cranor...
ADMA
2008
Springer
186views Data Mining» more  ADMA 2008»
14 years 3 months ago
A Distributed Privacy-Preserving Association Rules Mining Scheme Using Frequent-Pattern Tree
Association rules mining is a frequently used technique which finds interesting association and correlation relationships among large set of data items which occur frequently toge...
Chunhua Su, Kouichi Sakurai
SOSE
2006
IEEE
14 years 2 months ago
Service Engineering Design Patterns
Design of service-oriented applications differs from design of the component-based applications in granularity, abstraction and dynamic environment in which binding between client...
Nikola Milanovic