Sciweavers

5722 search results - page 523 / 1145
» Security Function Interactions
Sort
View
CSCWD
2005
Springer
15 years 10 months ago
Supporting peer-to-peer collaboration through trust
Distributed systems generally require their component parts to interact cooperatively, in order for the system as a whole to function effectively. For any given activity, several ...
Nathan Griffiths, Shanghua Sun
ICWE
2005
Springer
15 years 10 months ago
NavOptim: On the Possibility of Minimising Navigation Effort
Web applications have rapidly become critical to the interaction that organisations have with their external stakeholders. A major factor in the effectiveness of this interaction i...
Xiaoying Kong, David Lowe
136
Voted
CASSIS
2004
Springer
15 years 10 months ago
Mobile Resource Guarantees for Smart Devices
We present the Mobile Resource Guarantees framework: a system for ensuring that downloaded programs are free from run-time violations of resource bounds. Certificates are attached...
David Aspinall, Stephen Gilmore, Martin Hofmann, D...
TIDSE
2004
Springer
15 years 10 months ago
Mediapark: Presenting the Media Docks Luebeck with the Digital Storytelling System Jeherazade
Abstract. This article presents the first implementation results of a storytelling system called Jeherazade. The Jeherazade system is based on the idea to enhance the classical the...
Peter Hoffmann, Tim Eggert, Lia Hadley, Michael He...
ACMDIS
1997
ACM
15 years 9 months ago
How to Make Software Softer - Designing Tailorable Applications
The design of tailorable systems is an important issue for fields of application which are characterized by differentiation and dynamics. We show how tailorability can be combined...
Oliver Stiemerling, Helge Kahler, Volker Wulf