Sciweavers

1795 search results - page 213 / 359
» Security Models and Information Flow
Sort
View
ISN
1998
Springer
15 years 8 months ago
Business and Market Models of Brokerage in Network-Based Commerce
Enterprise models, based on the responsibilities and relationships underlying market activities, are used to provide a framework for representing and analysing the activity of bro...
Ros Strens, Mike Martin, John E. Dobson, Stephen P...
OOPSLA
2005
Springer
15 years 10 months ago
CanonSketch and TaskSketch: innovative modeling tools for usage-centered design
Two experimental tools to support usage-centered design using l use cases and canonical abstract prototypes are described. The models and methods of usage-centered design are outl...
Larry L. Constantine, Pedro Campos
DSRT
2004
IEEE
15 years 8 months ago
An Architecture for Web-Services Based Interest Management in Real Time Distributed Simulation
The Experimentation Command and Control Interface (XC2I) project has developed an architecture for a Webservice based viewer/controller for use with distributed simulations suppor...
Katherine L. Morse, Ryan Brunton, J. Mark Pullen, ...
GIS
2008
ACM
16 years 5 months ago
Integrating gazetteers and remote sensed imagery
This work explores the potential for increased synergy between gazetteers and high-resolution remote sensed imagery. These two data sources are complementary. Gazetteers provide h...
Shawn Newsam, Yi Yang
TRUSTBUS
2007
Springer
15 years 10 months ago
Recognition of Authority in Virtual Organisations
Abstract. A Virtual Organisation (VO) is a temporary alliance of autonomous, diverse, and geographically dispersed organisations, where the participants pool resources, information...
Tuan-Anh Nguyen, David W. Chadwick, Bassem Nasser