Sciweavers

2250 search results - page 171 / 450
» Authorizing applications in singularity
Sort
View
ICSE
2003
IEEE-ACM
15 years 10 months ago
Why Can't They Create Architecture Models Like "Developer X"? An Experience Report
A large financial company, struggling with legacy systems that did not interoperate, performed a pilot project to teach software architecture to an enthusiastic application develo...
George Fairbanks
ACMICEC
2006
ACM
112views ECommerce» more  ACMICEC 2006»
15 years 4 months ago
Persistent information security: beyond the e-commerce threat model
This paper introduces a new class of information security solution. The core technology, to authorize and track the use of digital files, was originally developed in eCommerce app...
Merv Matson, Mihaela Ulieru
INFSOF
2000
68views more  INFSOF 2000»
14 years 10 months ago
An extensible platform for the development of synchronous groupware
The development of groupware is a complex endeavor due to several inherent features not present in single-user applications. To address this complexity many authors have presented...
G. Licea, Jesús Favela
FGCS
2010
101views more  FGCS 2010»
14 years 8 months ago
Special section: Switched lightpaths
searchers are now invited to submit abstracts on one or more of the following topics: • Control plane mechanisms, e.g. circuit reservation • Network protocols research, e.g. DC...
P. E. L. Clarke, C. Greenwood, A. C. Davenhall
CHI
2008
ACM
15 years 10 months ago
Designing for bystanders: reflections on building a public digital forum
In this paper, we reflect on the design and deployment process of MAGICBoard, a public display deployed in a university setting that solicits the electronic votes and opinions of ...
Anthony Tang, Matthias Finke, Michael Blackstock, ...