Sciweavers

2954 search results - page 410 / 591
» Beyond
Sort
View
JHSN
2006
267views more  JHSN 2006»
15 years 5 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...
JIS
2006
100views more  JIS 2006»
15 years 5 months ago
The convergence of digital libraries and the peer-review process
Pre-print repositories have seen a significant increase in use over the past fifteen years across multiple research domains. Researchers are beginning to develop applications capa...
Marko A. Rodriguez, Johan Bollen, Herbert Van de S...
EJIS
2007
150views more  EJIS 2007»
15 years 5 months ago
e-Government information systems: Evaluation-led design for public value and client trust
e-Government systems differ from commercial information systems (IS) in that they frequently encompass strategic goals that go beyond efficiency, effectiveness and economy, and in...
Michael Grimsley, Anthony Meehan
JMM2
2006
103views more  JMM2 2006»
15 years 5 months ago
Content Distribution for Telecom Carriers
-- Distribution of digital content is a key revenue opportunity for telecommunications carriers. As media content moves from analog and physical media-based distribution to digital...
Benjamin Falchuk, David Gorton, Dave Marples
ENTCS
2007
158views more  ENTCS 2007»
15 years 5 months ago
Abstraction and Completeness for Real-Time Maude
ion and Completeness for Real-Time Maude Peter Csaba ¨Olveczky a,b and Jos´e Meseguer b a Department of Informatics, University of Oslo b Department of Computer Science, Universi...
Peter Csaba Ölveczky, José Meseguer