Sciweavers

871 search results - page 41 / 175
» A Decentralized Authorization Architecture
Sort
View
TSE
1998
77views more  TSE 1998»
14 years 9 months ago
Use Case Maps as Architectural Entities for Complex Systems
ABSTRACT. This paper presents a novel, scenario-based notation called Use Case Maps (UCMs) for describing, in a high-level way, how the organizational structure of a complex system...
Raymond J. A. Buhr
IPCCC
2007
IEEE
15 years 4 months ago
Optimal Cluster Head Selection in the LEACH Architecture
LEACH (Low Energy Adaptive Clustering Hierarchy) [1] is one of the popular cluster-based structures, which has been widely proposed in wireless sensor networks. LEACH uses a TDMA ...
Haiming Yang, Biplab Sikdar
HICSS
2007
IEEE
111views Biometrics» more  HICSS 2007»
15 years 4 months ago
Connected Giving: Ordinary People Coordinating Disaster Relief on the Internet
The Internet is widely valued for distributing control over information to a lateral network of individuals, but it is not clear how these networks can most effectively organize t...
Cristen Torrey, Moira Burke, Matthew L. Lee, Anind...
ETFA
2005
IEEE
15 years 3 months ago
A security architecture for data privacy and security
Data access and software exchange are often achieved over insecure networks such as the public Internet. System designers are therefore forced to be proactive with regard to verif...
Alfred C. Weaver
ECOWS
2009
Springer
15 years 4 months ago
RESTful SPARQL? You name it!: aligning SPARQL with REST and resource orientation
SPARQL is the standard query language for RDF, but currently is a read-only language defined in a way similar to SQL: Queries can be formulated, are submitted to a single process...
Erik Wilde, Michael Hausenblas