Sciweavers

2272 search results - page 347 / 455
» Validity Invariants and Effects
Sort
View
INFSOF
2008
83views more  INFSOF 2008»
15 years 3 months ago
A framework for ensuring consistency of Web Services Transactions
For efficiently managing Web Services (WS) transactions which are executed across multiple loosely-coupled autonomous organizations, isolation is commonly relaxed. A Web service o...
Seunglak Choi, Hangkyu Kim, Hyukjae Jang, Jungsook...
126
Voted
IJHCI
2006
95views more  IJHCI 2006»
15 years 3 months ago
Problem Prioritization in Usability Evaluation: From Severity Assessments Toward Impact on Design
Severity assessments enable prioritization of problems encountered during usability evaluations and thereby provide a device for guiding the utilization of design resources. Howeve...
Morten Hertzum
174
Voted
JCP
2008
142views more  JCP 2008»
15 years 3 months ago
QoS Aware Query Processing Algorithm for Wireless Sensor Networks
In sensor networks, continuous query is commonly used for collecting periodical data from the objects under monitoring. This sort of queries needs to be carefully designed, in orde...
Jun-Zhao Sun
CORR
2007
Springer
138views Education» more  CORR 2007»
15 years 3 months ago
On the Performance Evaluation of Encounter-based Worm Interactions Based on Node Characteristics
An encounter-based network is a frequently-disconnected wireless ad-hoc network requiring nearby neighbors to store and forward data utilizing mobility and encounters over time. U...
Sapon Tanachaiwiwat, Ahmed Helmy
129
Voted
ISI
2006
Springer
15 years 3 months ago
Cost-Sensitive Access Control for Illegitimate Confidential Access by Insiders
Abstract. In many organizations, it is common to control access to confidential information based on the need-to-know principle; The requests for access are authorized only if the ...
Young-Woo Seo, Katia P. Sycara