Sciweavers

361 search results - page 65 / 73
» An industrial case study in reconstructing requirements view...
Sort
View
JUCS
2010
136views more  JUCS 2010»
14 years 10 months ago
Multi-Purpose Infrastructure for Delivering and Supporting Mobile Context-Aware Applications
: The use of contextual information in mobile devices is receiving increasing attention in mobile and ubiquitous computing research. An important requirement for mobile development...
Juan Miguel López, Montserrat Sendín
JDCTA
2010
150views more  JDCTA 2010»
14 years 6 months ago
Proof as Composition: An approach for the Large-granularity Web Services Composition
The large-granularity Web services are a new form of Web services. In contrast to the traditional Web services, they often have more interfaces, encapsulate more complex business ...
Yuyu Yin, Ying Li, Jianwei Yin, ShuiGuang Deng
CHI
2011
ACM
14 years 3 months ago
A spreadsheet-based user interface for managing plural relationships in structured data
A key feature of relational database applications is managing plural relationships—one-to-many and many-to-many— between entities. However, since it is often infeasible to ado...
Eirik Bakke, David R. Karger, Rob Miller
COMPSAC
2011
IEEE
13 years 11 months ago
L1 - An Intermediate Language for Mixed-Protocol Secure Computation
—Secure Computation (SC) enables secure distributed computation of arbitrary functions of private inputs. It has many useful applications, e.g. benchmarking or auctions. Several ...
Axel Schröpfer, Florian Kerschbaum, Guenter M...
NDSS
2000
IEEE
15 years 4 months ago
A First Step Towards the Automatic Generation of Security Protocols
This paper describes automatic protocol generation (APG for short), a novel mechanism to generate security protocols automatically. With APG, the protocol designer inputs the spec...
Adrian Perrig, Dawn Xiaodong Song