Sciweavers

591 search results - page 77 / 119
» Embracing policy engineering
Sort
View
TGC
2005
Springer
15 years 3 months ago
Programming Cryptographic Protocols
Cryptographic protocols are useful for trust engineering in distributed transactions. Transactions require specific degrees of confidentiality and agreement between the principal...
Joshua D. Guttman, Jonathan C. Herzog, John D. Ram...
EUC
2005
Springer
15 years 3 months ago
The Performance Estimation of the Situation Awareness RFID System from Ubiquitous Environment Scenario
Many sensors providing situation data will be in everywhere under the ubiquitous environment. It requires the current RFID system should be extended to recognize and use situation ...
Dongwon Jeong, Heeseo Chae, Hoh Peter In
SIGMETRICS
2004
ACM
15 years 3 months ago
Insensitive load balancing
A large variety of communication systems, including telephone and data networks, can be represented by so-called Whittle networks. The stationary distribution of these networks is...
Thomas Bonald, Matthieu Jonckheere, Alexandre Prou...
KES
2004
Springer
15 years 3 months ago
Ontological Representations of Software Patterns
This paper1 is based on and advocates the trend in software engineering of extending the use of software patterns as means of structuring solutions to software development problems...
Jean-Marc Rosengard, Marian Florin Ursu
MDM
2004
Springer
15 years 3 months ago
Enabling Context-Aware and Privacy-Conscious User Data Sharing
This paper provides detail on two key components of the Houdini framework under development at Bell Labs, that enable context-aware and privacy-conscious user data sharing appropr...
Richard Hull, Bharat Kumar, Daniel F. Lieuwen, Pet...