Sciweavers

256 search results - page 22 / 52
» Using groups for investigating rewrite systems
Sort
View
IPCCC
2005
IEEE
15 years 9 months ago
Key management in wireless ad hoc networks: collusion analysis and prevention
Due to the dynamic nature of WAHN communications and the multi-node involvement in most WAHN applications, group key management has been proposed for efficient support of secure c...
Mohamed F. Younis, Kajaldeep Ghumman, Mohamed Elto...
97
Voted
CHI
2010
ACM
15 years 10 months ago
Fitting an activity-centric system into an ecology of workplace tools
Knowledge workers expend considerable effort managing fragmentation, characterized by constant switching among digital artifacts, when executing work activities. Activitycentric c...
Aruna D. Balakrishnan, Tara Matthews, Thomas P. Mo...
121
Voted
HT
2009
ACM
15 years 10 months ago
Contextualising tags in collaborative tagging systems
Collaborative tagging systems are now popular tools for organising and sharing information on the Web. While collaborative tagging offers many advantages over the use of controll...
Ching-man Au Yeung, Nicholas Gibbins, Nigel Shadbo...
TSE
2008
103views more  TSE 2008»
15 years 3 months ago
A Realistic Empirical Evaluation of the Costs and Benefits of UML in Software Maintenance
The Unified Modeling Language (UML) is the de facto standard for object-oriented software analysis and design modeling. However, few empirical studies exist which investigate the c...
Wojciech J. Dzidek, Erik Arisholm, Lionel C. Brian...
158
Voted
ICDS
2009
IEEE
15 years 10 months ago
Self Protecting Data for De-perimeterised Information Sharing
- The emergence of high-speed networks, Grid Computing, Service-Oriented Architectures, and an ever increasing ambient connection to mobile Internet has enabled an underpinning inf...
Pete Burnap, Jeremy Hilton