Sciweavers

21 search results - page 4 / 5
» hase 2008
Sort
View
HASE
2008
IEEE
13 years 11 months ago
Low Cost Secure Computation for the General Client-Server Computation Model
Due to the large number of attacks on open networks, information theft becomes a more and more severe problem. Secure computation can offer highly assured confidentiality protecti...
Liangliang Xiao, I-Ling Yen, Farokh B. Bastani
HASE
2008
IEEE
13 years 11 months ago
An Interaction-Based Test Sequence Generation Approach for Testing Web Applications
Web applications often use dynamic pages that interact with each other by accessing shared objects, e.g., session objects. Interactions between dynamic pages need to be carefully ...
Wenhua Wang, Sreedevi Sampath, Yu Lei, Raghu Kacke...
HASE
2008
IEEE
13 years 6 months ago
HyperMIP: Hypervisor Controlled Mobile IP for Virtual Machine Live Migration across Networks
Live migration provides transparent load-balancing and fault-tolerant mechanism for applications. When a Virtual Machine migrates among hosts residing in two networks, the network...
Qin Li, Jinpeng Huai, Jianxin Li, Tianyu Wo, Minxi...
HASE
2008
IEEE
13 years 11 months ago
Power Optimization in Fault-Tolerant Mobile Ad Hoc Networks
—In this paper, we investigate the transmission-power assignment problem for k-connected mobile ad hoc networks (MANETs), the problem of optimizing the lifetime of a MANET at a g...
Oliviero Riganelli, Radu Grosu, Samir R. Das, C. R...
HASE
2008
IEEE
13 years 6 months ago
Synopsis of Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission Value
Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint an...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...