Sciweavers

999 search results - page 94 / 200
» Modelling Management Components for Reuse Using UML
Sort
View
WISTP
2007
Springer
15 years 3 months ago
A New Resilient Key Management Protocol for Wireless Sensor Networks
Wireless Sensor Networks (WSN) security is an important issue which has been investigated by researchers for few years. The most fundamental security problem in WSN is key manageme...
Chakib Bekara, Maryline Laurent-Maknavicius
PADL
2004
Springer
15 years 3 months ago
Improved Compilation of Prolog to C Using Moded Types and Determinism Information
We describe the current status of and provide performance results for a prototype compiler of Prolog to C, ciaocc. ciaocc is novel in that it is designed to accept different kinds...
José F. Morales, Manuel Carro, Manuel V. He...
ADBIS
2006
Springer
100views Database» more  ADBIS 2006»
15 years 3 months ago
Novel Analysis Patterns in the Context of the Managed Investments Instruments
Abstract. Traditionally, the investment funds market exploits analysis and design concepts based on the procedural programming approach. We propose a set of analysis patterns which...
Luigi Ubezio, Claudia Raibulet, Antonio Carpinato
JBCS
2002
102views more  JBCS 2002»
14 years 9 months ago
Configurable Data Integration Middleware System
This paper presents a new approach for generating configured and flexible middleware systems for integration of heterogeneous and distributed data. The configuration is based on t...
Álvaro Cesar P. Barbosa, Fabio Porto, Ruben...
ECUMN
2007
Springer
15 years 4 months ago
Enforcing Access Control Using Risk Assessment
Context-based access control is an emerging approach for modeling adaptive solution, making access control management more flexible and powerful. But in the ubiquitous environment...
Nguyen Ngoc Diep, Le Xuan Hung, Yonil Zhung, Sungy...