Sciweavers

84 search results - page 15 / 17
» ieeecit 2010
Sort
View
IEEECIT
2010
IEEE
13 years 3 months ago
Learning Autonomic Security Reconfiguration Policies
Abstract--We explore the idea of applying machine learning techniques to automatically infer risk-adaptive policies to reconfigure a network security architecture when the context ...
Juan E. Tapiador, John A. Clark
IEEECIT
2010
IEEE
13 years 3 months ago
SAT: A Stream Architecture Template for Embedded Applications
- The increase of embedded applications complexity has demanded hardware more flexible while providing higher performance. Reconfigurable architectures and stream processing have b...
Qianming Yang, Nan Wu, Mei Wen, Yi He, Huayou Su, ...
IEEECIT
2010
IEEE
13 years 3 months ago
Understanding Resource Provisioning for ClimatePrediction.net
—Peer-to-peer computing, involving the participation of thousands of general purpose, public computers, has established itself as a viable paradigm for executing looselycoupled, ...
Malik Shahzad Kaleem Awan, Stephen A. Jarvis
IEEECIT
2010
IEEE
13 years 3 months ago
Enabling Privacy-preserving Credential-based Access Control with XACML and SAML
—In this paper we describe extensions to the access control industry standards XACML and SAML to enable privacy-preserving and credential-based access control. Rather than assumi...
Claudio Agostino Ardagna, Sabrina De Capitani di V...
IEEECIT
2010
IEEE
13 years 3 months ago
Research on Mobile Web Application Phone Simulator
Phone simulator is a simulation tool running on PC which can test debug phone software. It also provides front graphical user interface (GUI) like the true phone’s LCD. Develope...
Ziqiong Wang, Yanhong Peng, Lei Luo