Sciweavers

652 search results - page 49 / 131
» Deriving Specifications of Dependable Systems: toward a Meth...
Sort
View
CHI
2010
ACM
15 years 1 months ago
Informal interactions in nonprofit networks
Nonprofit organizations often need to excel in coordinating with other organizations and must do so in a variety of contexts and levels from the informal to the formal. Their abil...
Jennifer Stoll, W. Keith Edwards, Elizabeth D. Myn...
ICSE
2000
IEEE-ACM
15 years 1 months ago
Software engineering and middleware: a roadmap
The construction of a large class of distributed systems can be simplified by leveraging middleware, which is layered between network operating systems and application components....
Wolfgang Emmerich
SACRYPT
2001
Springer
126views Cryptology» more  SACRYPT 2001»
15 years 2 months ago
Analysis of the E0 Encryption System
The encryption system E0, which is the encryption system used in the Bluetooth specification, is examined. In the current paper, a method of deriving the cipher key from a set of ...
Scott R. Fluhrer, Stefan Lucks
CHI
2002
ACM
15 years 10 months ago
"I'd be overwhelmed, but it's just one more thing to do": availability and interruption in research management
Many CSCW projects dealing with individual availability and interruption filtering achieve only limited success. Perhaps this is because designers of such systems have limited evi...
James M. Hudson, Jim Christensen, Wendy A. Kellogg...
SECRYPT
2010
129views Business» more  SECRYPT 2010»
14 years 8 months ago
EnCoRe: Towards a Holistic Approach to Privacy
: EnCoRe: Towards a holistic approach to privacy Nick Papanikolaou, Sadie Creese, Michael Goldsmith, Marco Casassa Mont, Siani Pearson HP Laboratories HPL-2010-83 privacy policies...
Nick Papanikolaou, Sadie Creese, Michael Goldsmith...