Sciweavers

871 search results - page 145 / 175
» A Decentralized Authorization Architecture
Sort
View
CEEMAS
2003
Springer
15 years 2 months ago
Communication Security in Multi-agent Systems
Both, research and application development in the area of multi-agent systems currently undertakes rapid expansion. In order to use multi-agent technology in real applications, it ...
Petr Novák, Milan Rollo, Jirí Hod&ia...
EICS
2010
ACM
15 years 2 months ago
User interface plasticity: model driven engineering to the limit!
Ten years ago, I introduced the notion of user interface plasticity to denote the capacity of user interfaces to adapt, or to be adapted, to the context of use while preserving us...
Joëlle Coutaz
COOPIS
2002
IEEE
15 years 2 months ago
Object Security Attributes: Enabling Application-Specific Access Control in Middleware
This paper makes two main contributions towards establishing support for application-specific factors in middleware security mechanisms. First, it develops a simple classification...
Konstantin Beznosov
73
Voted
EDOC
2002
IEEE
15 years 2 months ago
An MDA-Based Model for Vertical Application Task Forces: An Experience Report
Thispaper describes a set of modeling techniquesfor developing vertical applications in specific domains. Previous approaches are mainly focused on obtaining final applications. W...
Luis E. Anido-Rifón, Juan M. Santos, Judith...
VLDB
1998
ACM
102views Database» more  VLDB 1998»
15 years 1 months ago
A Database System for Real-Time Event Aggregation in Telecommunication
Telecommunication networks process verylarge numbers of events in real time. In this environment, database applications demand both high throughput (at reasonable costs), and pred...
Jerry Baulier, Stephen Blott, Henry F. Korth, Abra...