Sciweavers

4330 search results - page 98 / 866
» Analyzing security architectures
Sort
View
OOPSLA
2009
Springer
15 years 9 months ago
Architecture in an agile world
Steven Fraser, Ethan Hadar, Irit Hadar, Dennis Man...
ETRICS
2006
15 years 8 months ago
Optimized Workflow Authorization in Service Oriented Architectures
Abstract. Complex business processes are usually realized by specifying the integration and interaction of smaller modular software components. For example, hitherto monolithic ent...
Martin Wimmer, Martina-Cezara Albutiu, Alfons Kemp...
WISEC
2010
ACM
15 years 12 months ago
On the tradeoff between trust and privacy in wireless ad hoc networks
As privacy moves to the center of attention in networked systems, and the need for trust remains a necessity, an important question arises: How do we reconcile the two seemingly c...
Maxim Raya, Reza Shokri, Jean-Pierre Hubaux
AGENTS
1999
Springer
15 years 9 months ago
Planning and Resource Allocation for Hard Real-Time, Fault-Tolerant Plan Execution
We describe the interface between a real-time resource allocation system with an AI planner in order to create fault-tolerant plans that are guaranteed to execute in hard real-tim...
Ella M. Atkins, Tarek F. Abdelzaher, Kang G. Shin,...
AGENTS
1997
Springer
15 years 9 months ago
An Adaptive Web Page Recommendation Service
An adaptive recommendation service seeks to adapt to its users, providing increasingly personalized recommendations over time. In this paper we introduce the \Fab" adaptive W...
Marko Balabanovic