Sciweavers

13277 search results - page 2586 / 2656
» An Approach to Clustering Abstracts
Sort
View
106
Voted
TRUST
2010
Springer
15 years 5 months ago
Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform
Abstract. Increasing adoption of smartphones in recent times has begun to attract more and more malware writers towards these devices. Among the most prominent and widely adopted o...
Mohammad Nauman, Sohail Khan, Xinwen Zhang, Jean-P...
ACSAC
2002
IEEE
15 years 5 months ago
Security Architecture of the Austrian Citizen Card Concept
When admitting electronic media as a means for citizens to approach public authorities – i.e., when advancing official proceedings towards e-Government – security is an indisp...
Herbert Leitold, Arno Hollosi, Reinhard Posch
ACSAC
2002
IEEE
15 years 5 months ago
Composable Tools For Network Discovery and Security Analysis
Security analysis should take advantage of a reliable knowledge base that contains semantically-rich information about a protected network. This knowledge is provided by network m...
Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richa...
123
Voted
ICNP
2002
IEEE
15 years 5 months ago
QoS Extension to BGP
To enable the end-to-end Quality of Service (QoS) guarantees in the Internet, based on the Border Gateway Protocol (BGP), inter-domain QoS advertising and routing are important. H...
Li Xiao, King-Shan Lui, Jun Wang, Klara Nahrstedt
KBSE
2002
IEEE
15 years 5 months ago
Report on the Workshop on the State of the Art in Automated Software Engineering
ort gives their abstracts. s of the position papers Recent Experiences with Code Generation and Task Automation Agents in Software Tools (J. Grundy, J. Hosking) As software grows i...
Yves Ledru, David F. Redmiles
« Prev « First page 2586 / 2656 Last » Next »