Sciweavers

1386 search results - page 245 / 278
» Towards mature IT services
Sort
View
ACSAC
2001
IEEE
14 years 1 months ago
A JCA-Based Implementation Framework for Threshold Cryptography
The Java Cryptography Architecture, JCA in short, was created to allow JCA-compliant cryptography providers to be plugged into a JCA-aware application at run time. This configurab...
Yih Huang, David Rine, Xunhua Wang
ICSE
2000
IEEE-ACM
14 years 1 months ago
Requirements engineering in the year 00: a research perspective
Requirements engineering (RE) is concerned with the identification of the goals to be achieved by the envisioned system, the operationalization of such goals into services and con...
Axel van Lamsweerde
ECAI
2008
Springer
13 years 11 months ago
A probabilistic trust model for semantic peer-to-peer systems
Semantic peer to peer (P2P) systems are fully decentralized overlay networks of people or machines (called peers) sharing and searching varied resources (documents, videos, photos...
Gia Hien Nguyen, Philippe Chatalic, Marie-Christin...
EDBT
2008
ACM
136views Database» more  EDBT 2008»
13 years 11 months ago
A New Approach to Modular Database Systems
In this paper we present our approach towards a modularized database management system (DBMS) whose components can be adapted at runtime and show the modularization of a DBMS bene...
Florian Irmert, Michael Daum, Klaus Meyer-Wegener
BCSHCI
2008
13 years 11 months ago
EZ phone: persuading mobile users to conserve energy
Mobile persuasion is using a mobile device to motivate people to change their behavior in a positive way. Thus there is the potential in investigating how mobile technology could ...
Abdullah Al Mahmud, Omar Mubin, Suleman Shahid, Ja...