Sciweavers

5722 search results - page 885 / 1145
» Security Function Interactions
Sort
View
ESAW
2009
Springer
15 years 10 months ago
Determining the Trustworthiness of New Electronic Contracts
Expressing contractual agreements electronically potentially allows agents to automatically perform functions surrounding contract use: establishment, fulfilment, renegotiation et...
Paul T. Groth, Simon Miles, Sanjay Modgil, Nir Ore...
ICWE
2009
Springer
15 years 10 months ago
Tagging-Aware Portlets
A corporate portal supports a community of users on cohesively managing a shared set of resources. Such management should also include social tagging, i.e. the practice of collabor...
Oscar Díaz, Sandy Pérez, Crist&oacut...
SEMWEB
2009
Springer
15 years 10 months ago
Node-Link and Containment Methods in Ontology Visualization
OWL Ontology language can be very expressive. This could provide difficulty in ontology understanding process. We belief, that an ontology visualization equipped with intuitive int...
Julia Dmitrieva, Fons J. Verbeek
TLCA
2009
Springer
15 years 10 months ago
Session-Based Communication Optimisation for Higher-Order Mobile Processes
In this paper we solve an open problem posed in our previous work on asynchronous subtyping [12], extending the method to higher-order session communication and functions. Our syst...
Dimitris Mostrous, Nobuko Yoshida
GLOBECOM
2008
IEEE
15 years 10 months ago
Transport of Long-Range Dependent Traffic in Single-Hop and Multi-Hop IEEE 802.11e Networks
 Long-range dependence (LRD) is a widely verified property of traffic crossing the wireless LAN radio interface. LRD severely affects network performance yielding longer queuing...
Stefano Bregni, Paolo Giacomazzi, Gabriella Saddem...