Sciweavers

236 search results - page 37 / 48
» Software Acquisition Based on Business Models
Sort
View
ASWEC
2006
IEEE
14 years 3 months ago
Formal Verification of the IEEE 802.11i WLAN Security Protocol
With the increased usage of wireless LANs (WLANs), businesses and educational institutions are becoming more concerned about wireless network security. The latest WLAN security pr...
Elankayer Sithirasenan, Saad Zafar, Vallipuram Mut...
IUI
2003
ACM
14 years 3 months ago
Supporting plan authoring and analysis
Interactive tools to help users author plans or processes are essential in a variety of domains. KANAL helps users author sound plans by simulating them, checking for a variety of...
Jihie Kim, Jim Blythe
APSEC
2008
IEEE
14 years 4 months ago
Domain Specific Engineering Environments
Computer Aided Software Engineering tools represent one the main successes of software engineering in the past decades. They however need to be improved along several dimensions i...
Jacky Estublier, Germán Vega, Philippe Lala...
STORAGESS
2005
ACM
14 years 3 months ago
The evolution of storage service providers: techniques and challenges to outsourcing storage
As enterprise storage needs grow, it is challenging to manage storage systems. The costs of locally managing, supporting, and maintaining resilience in storage systems has skyrock...
Ragib Hasan, William Yurcik, Suvda Myagmar
AAMAS
2007
Springer
13 years 10 months ago
An algebra for commitment protocols
Protocols enable unambiguous, smooth interactions among agents. Commitments among agents are a powerful means of developing protocols. Commitments enable flexible execution of pro...
Ashok U. Mallya, Munindar P. Singh