Sciweavers

2288 search results - page 412 / 458
» An integrated system for genetic analysis
Sort
View
SRDS
2007
IEEE
15 years 6 months ago
Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks
Sensors that operate in an unattended, harsh or hostile environment are vulnerable to compromises because their low costs preclude the use of expensive tamper-resistant hardware. ...
Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao
ADAEUROPE
2007
Springer
15 years 6 months ago
Towards User-Level Extensibility of an Ada Library: An Experiment with Cheddar
In this article, we experiment a way to extend an Ada library called Cheddar. Cheddar provides a domain specific language. Programs written with this domain specific language can...
Frank Singhoff, Alain Plantec
ESORICS
2007
Springer
15 years 6 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
RE
2007
Springer
15 years 6 months ago
Improving Performance Requirements Specifications from Field Failure Reports
Customer-reported field failures provide valuable information for the requirements of the next release. Without a systematic approach, the requirements of the next release may not...
Chih-Wei Ho, Laurie Williams, Annie I. Antó...
W2GIS
2007
Springer
15 years 6 months ago
Towards the Geo-spatial Querying of the Semantic Web with ONTOAST
One of the challenges raised by the construction of the semantic Web lies in the analysis and management of complex relationships (thematic, spatial and temporal) connecting severa...
Alina Dia Miron, Jérôme Gensel, Marl&...