Sciweavers

3726 search results - page 688 / 746
» Software Services and Software Maintenance
Sort
View
JHSN
2006
267views more  JHSN 2006»
13 years 8 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...
SIGCSE
2008
ACM
155views Education» more  SIGCSE 2008»
13 years 8 months ago
Towards a top-down approach to teaching an undergraduate grid computing course
Early undergraduate Grid computing courses generally took a bottom-up approach to Grid computing education starting with network protocols, client-server concepts, creating Web an...
Barry Wilkinson, Clayton Ferner
IJIEM
2007
113views more  IJIEM 2007»
13 years 8 months ago
Fairness concerns in digital right management models
: Digital piracy is threatening the global multimedia content industry and blindly applied coercive Digital Right Management (DRM) policies do nothing but legitimizing this piracy....
Luc Bouganim, Philippe Pucheral
WWW
2008
ACM
13 years 8 months ago
Workshop on social web and knowledge management (SWKM2008)
This paper provides an overview on the synergies between social web and knowledge managemen, topics, program committee members as well as summary of accepted papers for the SWKM20...
Peter Dolog, Markus Krötzsch, Sebastian Schaf...
CN
2004
127views more  CN 2004»
13 years 8 months ago
Intermediary infrastructures for the World Wide Web
Intermediaries are software entities, deployed on hosts of the wireline and wireless network, that mediate the interaction between clients and servers of the World Wide Web. In th...
Marios D. Dikaiakos