Sciweavers

3555 search results - page 546 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
PODC
2009
ACM
16 years 4 months ago
On a selfish caching game
In this work we define and study a new model for the caching problem in a heterogeneous wireless network under a flash-crowd scenario. Using non-cooperative game theory, we cast t...
Pietro Michiardi, Carla-Fabiana Chiasserini, Claud...
PODS
2003
ACM
157views Database» more  PODS 2003»
16 years 4 months ago
Algorithms for data migration with cloning
Our work is motivated by the problem of managing data on storage devices, typically a set of disks. Such high demand storage servers are used as web servers, or multimedia servers...
Samir Khuller, Yoo Ah Kim, Yung-Chun (Justin) Wan
CAISE
2009
Springer
15 years 10 months ago
P2S: A Methodology to Enable Inter-organizational Process Design through Web Services
Abstract. With the advent of Service Oriented Architecture organizations have experienced services as a platform-independent technology to develop and use simple internal applicati...
Devis Bianchini, Cinzia Cappiello, Valeria De Anto...
HICSS
2007
IEEE
103views Biometrics» more  HICSS 2007»
15 years 10 months ago
Understanding Context through a Comprehensive Prototyping Experience: A Testbed Research Strategy for Emerging Technologies
Information and Communication Technologies (ICTs) are rapidly changing and new technologies, processes, and skills are constantly emerging. An important challenge for the research...
José Ramón Gil-García, Theres...
QSIC
2007
IEEE
15 years 10 months ago
Model Checking Security Pattern Compositions
Security patterns capture best practice on secure software design and development. They document typical solutions to security problems. To ensure security, large software system ...
Jing Dong, Tu Peng, Yajing Zhao