Sciweavers

991 search results - page 58 / 199
» Foundations for Designing Secure Architectures
Sort
View
137
Voted
AISADM
2005
Springer
15 years 7 months ago
An Architecture for Distributed Agent-Based Data Preprocessing
Advances in agent technologies have fueled interest towards combining agent-based techniques with tools from data mining. Furthermore, the advent of the ubiquitous computing paradi...
Petteri Nurmi, Michael Przybilski, Greger Lind&eac...
HICSS
2008
IEEE
121views Biometrics» more  HICSS 2008»
15 years 8 months ago
An Integrated Architecture for Demand Response Communications and Control
1 In the competitive electricity structure, demand response programs enable customers to react dynamically to changes in electricity prices. The implementation of such programs ma...
Michael LeMay, Rajesh Nelli, George Gross, Carl A....
ICDCS
2002
IEEE
15 years 6 months ago
ControlWare: A Middleware Architecture for Feedback Control of Software Performance
Attainment of software performance assurances in open, largely unpredictable environments has recently become an important focus for real-time research. Unlike closed embedded sys...
Ronghua Zhang, Chenyang Lu, Tarek F. Abdelzaher, J...
118
Voted
GRID
2005
Springer
15 years 7 months ago
Web services and grid security vulnerabilities and threats analysis and model
The paper provides an overview of available web applications and Web Services security vulnerability models and proposes a classification of the potential Grid and Web Services at...
Yuri Demchenko, Leon Gommans, Cees T. A. M. de Laa...
GI
2009
Springer
15 years 6 months ago
Tokenized Interaction Architecture
: Out-of-Home (OOH) advertising is currently advancing into a new era: “pervasive advertising” is one of the buzz words describing a soft change from the traditional push-only ...
Boxian Dong, Bernhard Wally, Alois Ferscha