Sciweavers

3920 search results - page 679 / 784
» Challenges in Software Evolution
Sort
View
IAAI
2003
15 years 5 months ago
Secure Mobile Agents on Ad Hoc Wireless Networks
This paper describes SWAT, a Secure Wireless Agent Testbed. Our goal is to create an integrated environment to study information assurance for mobile agent systems on ad hoc wirel...
Evan Sultanik, Donovan Artz, Gustave Anderson, Mos...
135
Voted
SCANGIS
2001
15 years 5 months ago
Location-based services: A database perspective
We are heading rapidly towards a global computing and information infrastructure that will contain billions of wirelessly connected devices, many of which will offer so-called loca...
Christian S. Jensen, Anders Friis-Christensen, Tor...
144
Voted
INTERACT
2003
15 years 5 months ago
Chemistry Education: A Tangible Interaction Approach
: This system paper reports on some of the advantages tangible interaction can bring to chemistry education. The paper describes how we realized a Tangible User Interface (TUI) cal...
Morten Fjeld, Patrick Juchli, Benedikt M. Voegtli
137
Voted
WORM
2004
15 years 5 months ago
A study of mass-mailing worms
Mass-mailing worms have made a significant impact on the Internet. These worms consume valuable network resources and can also be used as a vehicle for DDoS attacks. In this paper...
Cynthia Wong, Stan Bielski, Jonathan M. McCune, Ch...
DBSEC
2000
110views Database» more  DBSEC 2000»
15 years 5 months ago
Role-Based Security in a Distributed Resource Environment
There are many technologies for distributed processing/interoperation, including CORBA, DCE, DCOM, Enterprise Java Beans, Java IDL, JDBC, etc. Most promising, is the emergence of ...
Steven A. Demurjian, T. C. Ting, J. Balthazar, H. ...