Sciweavers

436 search results - page 43 / 88
» Arguing for gaining access to information
Sort
View
IDEAL
2005
Springer
15 years 7 months ago
Patterns in Complex Systems Modeling
The design, development, and use of complex systems models raises a unique class of challenges and potential pitfalls, many of which are commonly recurring problems. Over time, res...
Janet Wiles, James Watson
INFOCOM
2003
IEEE
15 years 7 months ago
Dynamic Load Balancing Through Coordinated Scheduling in Packet Data Systems
— Third generation code-division multiple access (CDMA) systems propose to provide packet data service through a high speed shared channel with intelligent and fast scheduling at...
Suman Das, Harish Viswanathan, Gee Rittenhouse
USS
2008
15 years 4 months ago
Modeling the Trust Boundaries Created by Securable Objects
One of the most critical steps of any security review involves identifying the trust boundaries that an application is exposed to. While methodologies such as threat modeling can ...
Matt Miller
JPDC
2011
219views more  JPDC 2011»
14 years 9 months ago
BlobSeer: Next-generation data management for large scale infrastructures
As data volumes increase at a high speed in more and more application fields of science, engineering, information services, etc., the challenges posed by data-intensive computing...
Bogdan Nicolae, Gabriel Antoniu, Luc Bougé,...
W4A
2006
ACM
15 years 7 months ago
Evaluating interfaces for intelligent mobile search
Recent developments in the mobile phone market have led to a significant increase in the number of users accessing the Mobile Internet. Handsets have been improved to support a d...
Karen Church, Barry Smyth, Mark T. Keane