Sciweavers

5372 search results - page 242 / 1075
» complexity 2007
Sort
View
IEEEIAS
2007
IEEE
14 years 2 months ago
Modelling Quality of Protection in Outsourced Business Processes
There is a large number of research papers and standards dedicated to security for outsourced data. Yet, most papers propose new controls to access and protect the data rather tha...
Fabio Massacci, Artsiom Yautsiukhin
SAINT
2007
IEEE
14 years 2 months ago
Privacy Management for Context Transponders
While by now feasible solutions to protect privacy for complex ubiquitous applications are available, very small devices, called context transponders (CTP) still lack resources to...
Michael Fahrmair, Wassiou Sitou, Bernd Spanfelner
CALCO
2007
Springer
89views Mathematics» more  CALCO 2007»
14 years 2 months ago
Structured Co-spans: An Algebra of Interaction Protocols
Abstract. We extend the theory of (co-)spans as a means of providing an algebraic approach to complex interactions as they arise in software-intensive systems. In order to make int...
José Luiz Fiadeiro, Vincent Schmitt
ESA
2007
Springer
113views Algorithms» more  ESA 2007»
14 years 2 months ago
Distance Coloring
Given a graph G = (V, E), a (d, k)-coloring is a function from the vertices V to colors {1, 2, . . . , k} such that any two vertices within distance d of each other are assigned di...
Alexa Sharp
ESAW
2007
Springer
14 years 2 months ago
Amongst First-Class Protocols
The ubiquity of our increasingly distributed and complex computing environments have necessitated the development of programming approaches and paradigms that can automatically man...
Tim Miller, Jarred McGinnis