Sciweavers

3999 search results - page 91 / 800
» Design of Optical Access Systems using Computer Modeling
Sort
View
SACMAT
2010
ACM
15 years 3 months ago
An architecture for enforcing end-to-end access control over web applications
The web is now being used as a general platform for hosting distributed applications like wikis, bulletin board messaging systems and collaborative editing environments. Data from...
Boniface Hicks, Sandra Rueda, Dave King 0002, Thom...
CAISE
2010
Springer
15 years 5 months ago
Monitoring and Analyzing Service-Based Internet Systems through a Model-Aware Service Environment
Abstract As service-based Internet systems get increasingly complex they become harder to manage at design time as well as at runtime. Nowadays, many systems are described in terms...
Ta'id Holmes, Uwe Zdun, Florian Daniel, Schahram D...
UMUAI
2002
76views more  UMUAI 2002»
15 years 4 months ago
User Models and User Physical Capability
Current interface design practices are based on user models and descriptions derived almost exclusively from studies of able-bodied users (Keates et al., 1999). However, such users...
Simeon Keates, Patrick Langdon, P. John Clarkson, ...
SP
2009
IEEE
155views Security Privacy» more  SP 2009»
15 years 11 months ago
A Logic of Secure Systems and its Application to Trusted Computing
We present a logic for reasoning about properties of secure systems. The logic is built around a concurrent programming language with constructs for modeling machines with shared ...
Anupam Datta, Jason Franklin, Deepak Garg, Dilsun ...
MSWIM
2009
ACM
15 years 11 months ago
Medium access control for underwater acoustic sensor networks with MIMO links
The requirements of multimedia underwater monitoring applications with heterogeneous traffic demands in terms of bandwidth and end-to-end reliability are considered in this artic...
Li-Chung Kuo, Tommaso Melodia