Sciweavers

4944 search results - page 868 / 989
» A Framework for Adaptive Visualization
Sort
View
APLAS
2004
ACM
15 years 10 months ago
Protocol Specialization
Abstract. In component-based programming, the programmer assembles applications from prefabricated components. The assembly process has two main steps: adapting a component by twea...
Matthias Neubauer, Peter Thiemann
SAC
2004
ACM
15 years 10 months ago
Missing requirements and relationship discovery through proxy viewpoints model
This paper addresses the problem of “missing requirements” in software requirements specification (SRS) expressed in natural language. Due to rapid changes in technology and b...
Seok Won Lee, David C. Rine
SWS
2004
ACM
15 years 10 months ago
Applying hierarchical and role-based access control to XML documents
W3C Recommendations XML Encryption and XML-Digital Signature can be used to protect the confidentiality of and provide assurances about the integrity of XML documents transmitted...
Jason Crampton
ACNS
2004
Springer
142views Cryptology» more  ACNS 2004»
15 years 10 months ago
S-RIP: A Secure Distance Vector Routing Protocol
Distance vector routing protocols (e.g., RIP) have been widely used on the Internet, and are being adapted to emerging wireless ad hoc networks. However, it is well-known that exis...
Tao Wan, Evangelos Kranakis, Paul C. van Oorschot
ANTSW
2004
Springer
15 years 10 months ago
An Ant Approach to Membership Overlay Design
Designing an optimal overlay communication network for a set of processes on the Internet is a central problem of peer-to-peer (P2P) computing. Such a network defines membership a...
Vittorio Maniezzo, Marco A. Boschetti, Márk...