Sciweavers

162 search results - page 18 / 33
» sac 2006
Sort
View
83
Voted
SAC
2006
ACM
15 years 4 months ago
The advent of trusted computing: implications for digital forensics
The release of computer hardware devices based on “trusted computing” technologies is heralding a paradigm shift that will have profound implications for digital forensics. In...
Mike Burmester, Judie Mulholland
SAC
2006
ACM
15 years 4 months ago
Trading services in ontology-driven markets
In recent years, Web Services have become the key technology for building flexible and interoperable computing infrastructure. However, to realize the vision of a full-fletched ...
Steffen Lamparter, Björn Schnizler
SAC
2006
ACM
15 years 4 months ago
Detecting identifiable areas in mobile environments
Location-based applications and services are getting increasingly important for mobile users. They take into account a mobile user's current location and provide a location-d...
Jörg Roth
SAC
2006
ACM
15 years 4 months ago
Methods and guidelines for the design and development of domestic ubiquitous computing applications
Bringing ubiquitous computing applications to home environments is a great challenge. In our research we investigate how applications can be conceived, designed, and implemented t...
Albrecht Schmidt, Lucia Terrenghi
SAC
2006
ACM
14 years 10 months ago
Transforming OCL constraints: a context change approach
Integrity constraints (ICs) play a key role in the definition of conceptual schemas. In the UML, ICs are usually specified as invariants written in the OCL. However, due to the hi...
Jordi Cabot, Ernest Teniente