Sciweavers

10 search results - page 1 / 2
» issads 2005
Sort
View
ISSADS
2005
Springer
13 years 9 months ago
Security Challenges of Distributed e-Learning Systems
Roberto Gómez Cárdenas, Erika Mata S...
ISSADS
2005
Springer
13 years 9 months ago
Interpretation of UML Sequence Diagrams as Causality Flows
Christophe Sibertin-Blanc, Omar Tahir, Janette Car...
ISSADS
2005
Springer
13 years 9 months ago
Data Hiding in Identification and Offset IP Fields
Abstract. . Steganography is defined as the art and science of hiding information, it takes one piece of information and hides it within another. The piece more used to hide inform...
Enrique Cauich, Roberto Gómez Cárden...
ISSADS
2005
Springer
13 years 9 months ago
Overview the Key Management in Ad Hoc Networks
The aim of this paper is to show some solutions for key management in ad hoc networks. The major problem in providing security services in such infrastructure less networks is how...
Gerardo del Valle, Roberto Gómez Cár...
ISSADS
2005
Springer
13 years 9 months ago
Model Fragmentation for Distributed Workflow Execution: A Petri Net Approach
Workflow is the key technology for business process automation, while distributed workflow is the solution to deal with the decentralized nature of workflow applications and the pe...
Wei Tan, Yushun Fan