Sciweavers

4486 search results - page 818 / 898
» Cross-Evaluation: A new model for information system evaluat...
Sort
View
ICLP
2010
Springer
15 years 1 months ago
Bisimilarity in Concurrent Constraint Programming
Abstract. In this doctoral work we aim at developing a new approach to labelled semantics and equivalences for the Concurrent Constraint Programming (CCP) which will enable a broad...
Andres A. Aristizabal P.
ITCC
2005
IEEE
15 years 3 months ago
A Framework for Key Management in Mobile Ad Hoc Networks
Background: Key management in a mobile ad hoc environment is complicated by frequently partitioning network topology. Recently proposed key management systems (KMSs) provide limit...
George C. Hadjichristofi, William Joseph Adams, Na...
SACMAT
2003
ACM
15 years 3 months ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf
WWW
2008
ACM
15 years 10 months ago
Enabling secure digital marketplace
The fast development of the Web provides new ways for effective distribution of network-based digital goods. A digital marketplace provides a platform to enable Web users to effec...
Hongxia Jin, Vladimir Zbarsky
ITNG
2007
IEEE
15 years 4 months ago
Software Reuse: Research and Practice
— It has been almost four decades since the idea of software reuse was proposed. Many success stories have been told, yet it is believed that software reuse is still in the devel...
Sajjan G. Shiva, Lubna Abou Shala