Sciweavers

WETICE
2003
IEEE
15 years 6 months ago
Attack-Resistance of Computational Trust Models
The World Wide Web encourages widely-distributed, open, decentralised systems that span multiple administrative domains. Recent research has turned to trust management [4] as a fr...
Andrew Twigg, Nathan Dimmock
ISADS
2003
IEEE
15 years 6 months ago
A GUI Approach to Programming of TMO Frames and Design of Real-Time Distributed Computing Software
An advanced high-level approach for programming of real-time distributed computing applications, the TMO (Time-triggered Message-triggered Object) programming and specification sc...
K. H. Kim, Seok-Joong Kang
ISADS
2003
IEEE
15 years 6 months ago
An Approach to Developing Information Dissemination Service for Ubiquitous Computing Applications
In many ubiquitous computing (ubicomp) applications, such as smart classrooms, hospitals, construction sites, stadiums, shopping malls, emergency services, law enforcement, conven...
Stephen S. Yau, Sheikh Iqbal Ahamed
WETICE
2003
IEEE
15 years 6 months ago
Requirements Engineering and Agile Software Development
This article compares traditional requirements engineering approaches and agile software development. Our paper analyzes commonalities and differences of both approaches and deter...
Frauke Paetsch, Armin Eberlein, Frank Maurer
WETICE
2003
IEEE
15 years 6 months ago
Design and Implementation of Virtual Private Services
Large scale distributed applications such as electronic commerce and online marketplaces combine network access with multiple storage and computational elements. The distributed r...
Sotiris Ioannidis, Steven M. Bellovin, John Ioanni...
Emerging Technology
Top of PageReset Settings