Sciweavers

SAC
2010
ACM
14 years 7 months ago
Performance and extension of user space file systems
Several efforts have been made over the years for developing file systems in user space. Many of these efforts have failed to make a significant impact as measured by their us...
Aditya Rajgarhia, Ashish Gehani
SAC
2010
ACM
14 years 7 months ago
A deidealisation semantics for KAOS
KAOS is a goal directed requirements engineering framework based on the decomposition and refinement of goals. Decomposition and refinement continue until a point is reached at ...
Richard Banach
SAC
2010
ACM
14 years 7 months ago
A business driven cloud optimization architecture
In this paper, we discuss several facets of optimization in cloud computing, the corresponding challenges and propose an architecture for addressing those challenges. We consider ...
Marin Litoiu, C. Murray Woodside, Johnny Wong, Joa...
SAC
2010
ACM
14 years 7 months ago
CNL4DSA: a controlled natural language for data sharing agreements
A Data Sharing Agreement (DSA) is an agreement among contracting parties regulating how they share data. A DSA represents a flexible mean to assure privacy of data exchanged on t...
Ilaria Matteucci, Marinella Petrocchi, Marco Luca ...
SAC
2010
ACM
14 years 7 months ago
Towards fine-grained and application-centric access control for wireless sensor networks
The emerging reality of wireless sensor networks deployed as long-lived infrastructure required to serve multiple applications necessitates the development of fine-grained securi...
Nelson Matthys, Syed Rehan Afzal, Christophe Huyge...
SAC
2010
ACM
14 years 7 months ago
Prediction of social bookmarking based on a behavior transition model
Tadanobu Furukawa, Seishi Okamoto, Yutaka Matsuo, ...
SAC
2010
ACM
14 years 7 months ago
Application-guided tool development for architecturally diverse computation
Roger D. Chamberlain, Jeremy Buhler, M. Franklin, ...
SAC
2010
ACM
14 years 7 months ago
Ontology-based generation of IT-security metrics
Legal regulations and industry standards require organizations to measure and maintain a specified IT-security level. Although several IT-security metrics approaches have been de...
Stefan Fenz
SAC
2010
ACM
14 years 7 months ago
Implicit invocation of traits
Thomas Pawlitzki, Friedrich Steimann