Sciweavers

433 search results - page 55 / 87
» Web-Enabling Legacy Applications
Sort
View
SACMAT
2006
ACM
14 years 3 months ago
Traust: a trust negotiation-based authorization service for open systems
In recent years, trust negotiation (TN) has been proposed as a novel access control solution for use in open system environments in which resources are shared across organizationa...
Adam J. Lee, Marianne Winslett, Jim Basney, Von We...
EUSAI
2004
Springer
14 years 3 months ago
QoS Provision Using Dual RF Modules in Wireless LAN
With the rapid growth of emerging demand and deployment of wireless LAN (WLAN), much of traffic including multimedia traffic is forced to travel over WLAN. Since the legacy IEEE 80...
Sang-Hee Park, Hye-Soo Kim, Chun-Su Park, Kyunghun...
GEOINFORMATICA
2007
148views more  GEOINFORMATICA 2007»
13 years 9 months ago
Assessing the Certainty of Locations Produced by an Address Geocoding System
Addresses are the most common georeferencing resource people use to communicate to others a location within a city. Urban GIS applications that receive data directly fromcitizens,...
Clodoveu A. Davis, Frederico T. Fonseca
INFSOF
2007
126views more  INFSOF 2007»
13 years 9 months ago
Software maintenance seen as a knowledge management issue
Creating and maintaining software systems is a knowledge intensive task. One needs to have a good understanding of the application domain, the problem to solve and all its require...
Nicolas Anquetil, Káthia Marçal de O...
ACSAC
2005
IEEE
14 years 3 months ago
A Nitpicker's guide to a minimal-complexity secure GUI
Malware such as Trojan Horses and spyware remain to be persistent security threats that exploit the overly complex graphical user interfaces of today’s commodity operating syste...
Norman Feske, Christian Helmuth