Sciweavers

2111 search results - page 202 / 423
» How to Program Pervasive Systems
Sort
View
127
Voted
ICEIS
2008
IEEE
15 years 10 months ago
SORCER: Computing and Metacomputing Intergrid
— This paper investigates Grid computing from the point of view three basic computing platforms. The platform consists of virtual compute resources, a programming environment all...
Michael Soblewski
UM
2001
Springer
15 years 7 months ago
Tailoring Privacy to Users' Needs
This article discusses how the deployment of personalized systems is affected by users’ privacy concerns and by privacy legislation. It shows that these impacts are substantial a...
Alfred Kobsa
PPCP
1993
15 years 7 months ago
Practical Issues in Graphical Constraints
Use of constraint-based techniques in interactive graphics applications poses a variety of unique challenges to system implementors. This paper begins by describing how interface ...
Michael Gleicher
ECOOP
2006
Springer
15 years 7 months ago
Evolution of an Adaptive Middleware Exploiting Architectural Reflection
: Nowadays information systems are required to adapt themselves dynamically to the ever changing environment and requirements. Architectural reflection represents a principled mean...
Francesca Arcelli Fontana, Claudia Raibulet
CSFW
2008
IEEE
15 years 5 months ago
End-to-End Enforcement of Erasure and Declassification
Declassification occurs when the confidentiality of information is weakened; erasure occurs when the confidentiality of information is strengthened, perhaps to the point of comple...
Stephen Chong, Andrew C. Myers