Sciweavers

991 search results - page 174 / 199
» Foundations for Designing Secure Architectures
Sort
View
ICDCIT
2005
Springer
15 years 3 months ago
Off-Line Micro-payment System for Content Sharing in P2P Networks
— Micro-payment systems have the potential to provide non-intrusive, high-volume and low-cost pay-asyou-use services for a wide variety of web-based applications. We proposed a n...
Xiaoling Dai, John C. Grundy
OOPSLA
2004
Springer
15 years 3 months ago
C-SAW and genAWeave: a two-level aspect weaving toolsuite
This demonstration will feature overviews of the C-SAW and GenAWeave projects. The first half of the presentation will introduce the concept of two-level aspect weaving, which uni...
Jeffrey G. Gray, Jing Zhang, Suman Roychoudhury, I...
INFOCOM
2002
IEEE
15 years 2 months ago
FPAC: Fast, Fixed-Cost Authentication for Access to Reserved Resources
—Enhanced network services often involve allocating resources (bandwidth/buffer space) preferentially to packets belonging to certain flows or traffic classes. Such services ar...
Kenneth L. Calvert, Srinivasan Venkatraman, Jim Gr...
AUTONOMICS
2008
ACM
14 years 12 months ago
Emergent engineering for the management of complex situations
Ubiquitous computing and communication environments connect systems and people in unprecedented ways, but also fundamentally challenge the mindset of traditional systems engineeri...
René Doursat, Mihaela Ulieru
SERVICES
2008
85views more  SERVICES 2008»
14 years 11 months ago
Early Aspects for Non-Functional Properties in Service Oriented Business Processes
In Service Oriented Architecture, each application is often designed with a set of reusable services and a business process. In order to retain the reusability of services, it is ...
Hiroshi Wada, Junichi Suzuki, Katsuya Oba