Sciweavers

23915 search results - page 172 / 4783
» Management
Sort
View
EUROSSC
2009
Springer
15 years 10 months ago
A Context Lifecycle for Web-Based Context Management Services
Abstract. During the development of context aware applications a context management component must traditionally be created. This task requires specialist context lifecycle managem...
Gearoid Hynes, Vinny Reynolds, Manfred Hauswirth
COMPSAC
2008
IEEE
15 years 10 months ago
Trade-off Analysis of Identity Management Systems with an Untrusted Identity Provider
—Internet users interact with multiple Web Service Providers (WSP), and therefore, must remember and manage multiple passwords. Users try to overcome the burden of password manag...
Golnaz Elahi, Zeev Lieber, Eric S. K. Yu
HICSS
2008
IEEE
237views Biometrics» more  HICSS 2008»
15 years 10 months ago
Integration of an Ontological Information Security Concept in Risk Aware Business Process Management
Abstract— The ability to prevent risks as well as to appropriately counteract occurring threats has increasingly become a crucial success factor. Traditional business process man...
Gernot Goluch, Andreas Ekelhart, Stefan Fenz, Stef...
ICPADS
2008
IEEE
15 years 10 months ago
Delaunay State Management for Large-Scale Networked Virtual Environments
Peer-to-Peer (P2P) networks have been proposed as a promising approach to create more scalable Networked Virtual Environment (NVE) systems, but P2P-NVE also increases the probabil...
Chien-Hao Chien, Shun-Yun Hu, Jehn-Ruey Jiang
KBSE
2008
IEEE
15 years 10 months ago
Cleman: Comprehensive Clone Group Evolution Management
—Recent research results have shown more benefits of the management of code clones, rather than detecting and removing them. However, existing management approaches for code clo...
Tung Thanh Nguyen, Hoan Anh Nguyen, Nam H. Pham, J...