Sciweavers

633 search results - page 6 / 127
» What's in a Service
Sort
View
ADC
2009
Springer
122views Database» more  ADC 2009»
14 years 4 months ago
What is Required in Business Collaboration?
Access control has been studied for sometime, and there are a number of theories and techniques for handling access control for single or centralised systems; however, unique and ...
Daisy Daiqin He, Michael Compton, Kerry Taylor, Ji...
ICSE
2003
IEEE-ACM
14 years 10 months ago
Component Technology - What, Where, and How?
Software components, if usedproperly, ofj~r many software engineering benefits. Yet, they also pose many original challenges starting fi'om quality assurance and ranging to a...
Clemens A. Szyperski
CHI
2005
ACM
14 years 10 months ago
Location disclosure to social relations: why, when, & what people want to share
Advances in location-enhanced technology are making it easier for us to be located by others. These new technologies present a difficult privacy tradeoff, as disclosing one's...
Sunny Consolvo, Ian E. Smith, Tara Matthews, Antho...
SOFTWARE
2002
13 years 9 months ago
Facing Fault Management as It Is, Aiming for What You Would Like It to Be
Telecommunication systems are built with extensive redundancy and complexity to ensure robustness and quality of service. Such systems requires complex fault identification and man...
Roy Sterritt
INFOCOM
2011
IEEE
13 years 1 months ago
Content downloading in vehicular networks: What really matters
—Content downloading in vehicular networks is a topic of increasing interest: services based upon it are expected to be hugely popular and investments are planned for wireless ro...
Francesco Malandrino, Claudio Casetti, Carla-Fabia...