Sciweavers

662 search results - page 45 / 133
» Involving End Users in Distributed Requirements Engineering
Sort
View
ECSA
2008
Springer
14 years 11 months ago
A Security Model for Internet-Based Digital Asset Management Systems
Abstract. Usage and exploitation of the Internet is a critical requirement for managing and distributing valuable digital assets. This requirement introduces a great number of thre...
Ioannis Chatzigiannakis, Vasiliki Liagkou, D. Salo...
TON
2002
123views more  TON 2002»
14 years 9 months ago
Utility-based rate control in the Internet for elastic traffic
In a communication network, a good rate allocation algorithm should reflect the utilities of the users while being fair. We investigate this fundamental problem of achieving the sy...
Richard J. La, Venkat Anantharam
COMPSAC
2006
IEEE
15 years 3 months ago
An Approach for Developing Adaptive, Mobile Applications with Separation of Concerns
Modern mobile computing paradigms have set new challenges for the development of distributed mobile applications and services. Because of the variability which characterizes the c...
Nearchos Paspallis, George A. Papadopoulos
JETAI
2007
131views more  JETAI 2007»
14 years 9 months ago
A computational architecture for heterogeneous reasoning
Reasoning, problem solving, indeed the general process of acquiring knowledge, is not an isolated, homogenous affair involving a one agent using a single form of representation, b...
Dave Barker-Plummer, John Etchemendy
HICSS
2010
IEEE
180views Biometrics» more  HICSS 2010»
15 years 4 months ago
Hiding in Plain Sight: Exploiting Broadcast for Practical Host Anonymity
Users are being tracked on the Internet more than ever before as Web sites and search engines gather pieces of information sufficient to identify and study their behavior. While m...
Craig A. Shue, Minaxi Gupta