Search

Showing total 107 results

Search Constraints

Start Over You searched for: Topic software engineering Remove constraint Topic: software engineering Publication Type Books Remove constraint Publication Type: Books Publication Type Electronic Resources Remove constraint Publication Type: Electronic Resources Journal on the move to meaningful internet systems 2006: otm 2006 workshops Remove constraint Journal: on the move to meaningful internet systems 2006: otm 2006 workshops Publisher springer nature Remove constraint Publisher: springer nature
107 results

Search Results

51. Security Enhancement of a Remote User Authentication Scheme Using Smart Cards.

52. An Ontology-Based Scheme Enabling the Modeling of Cooperation in Business Processes.

53. From Inter-organizational to Inter-departmental Collaboration - Using Multiple Process Levels.

54. Semantic LBS: Ontological Approach for Enhancing Interoperability in Location Based Services.

55. Information Leakage and Capability Forgery in a Capability-Based Operating System Kernel.

56. Secure and Seamless Handoff Scheme for a Wireless LAN System.

57. An Efficient Algorithm for Fingercode-Based Biometric Identification.

58. Improving the Dynamic ID-Based Remote Mutual Authentication Scheme.

59. Use of SAML for Single Sign-On Access to Multimedia Contents in a Peer-to-Peer Network.

60. New Key Generation Algorithms for the XTR Cryptosytem.

61. On the Existence of Related-Key Oracles in Cryptosystems Based on Block Ciphers.

62. Preamble Encryption Mechanism for Enhanced Privacy in Ethernet Passive Optical Networks.

63. An Efficient ID-Based Delegation Network.

64. An Efficient Dispute Resolving Method for Digital Images.

65. An Implementation of a Trusted and Secure DRM Architecture.

66. Using Image Steganography for Decryptor Distribution.

67. Agent Community Support for Crisis-Response Organizations.

68. Metadata Mechanisms: From Ontology to Folksonomy ... and Back.

69. Community-Driven Ontology Evolution Based on Folksonomies.

70. Communications Breakdown: Revisiting the Question of Information and Its Significance for Community Informatics Projects.

71. A Configurable Event Correlation Architecture for Adaptive J2EE Applications.

72. Dynamic Load Balancing for Online Games Using Predefined Area Information.

73. Mediation as Recommendation: An Approach to Design Mediators for Object Catalogs.

74. Automated Deployment of Enterprise Systems in Large-Scale Environments.

75. Scheduling of Composite Web Services.

76. Middleware Support for Monitoring: Privacy and Audit in Healthcare Applications.

77. IS 2006 PC Co-chairs' Message.

78. Multimodal Architectures: Issues and Experiences.

79. Bringing Together Structured and Unstructured Sources: The OUMSUIS Approach.

80. Methodologically Designing a Hierarchically Organized Concept-Based Terminology Database to Improve Access to Biomedical Documentation.

81. Secure EPCglobal Class-1 Gen-2 RFID System Against Security and Privacy Problems.

82. Agent-Grid Integration Ontology.

83. Filtering Internet News Feeds Using Ad-Hoc Ontologies.

84. Autonomous Deployment and Reconfiguration of Component-Based Applications in Open Distributed Environments.

85. Distributed Adaptation Reasoning for a Mobility and Adaptation Enabling Middleware.

87. MONET 2006 PC Co-chairs' Message.

88. MIOS-CIAO 2006 PC Co-chairs' Message.

89. AWeSOMe 2006 PC Co-chairs' Message.

90. MobiSoft: An Agent-Based Middleware for Social-Mobile Applications.

91. Supporting Mobile Activities in a Shared Semantic Ambient.

92. An Event-Trigger-Rule Model for Supporting Collaborative Knowledge Sharing Among Distributed Organizations.

93. Modeling and Storing Scientific Protocols.

94. A Proposal for a Gene Functions Wiki.

95. Suggested Ontology for Pharmacogenomics (SO-Pharm): Modular Construction and Preliminary Testing.

96. Solving Bao's Colluding Attack in Wang's Fair Payment Protocol.

97. Securing Data Accountability in Decentralized Systems.

98. Examining the DoS Resistance of HIP.

99. From Features Extraction to Strong Security in Mobile Environment: A New Hybrid System.

100. A Case Against Currently Used Hash Functions in RFID Protocols.