Sciweavers

6195 search results - page 191 / 1239
» Cloud Computing Security
Sort
View
ICSOC
2009
Springer
15 years 2 months ago
A Genetic Algorithms-Based Approach for Optimized Self-protection in a Pervasive Service Middleware
With increasingly complex and heterogeneous systems in pervasive service computing, it becomes more and more important to provide self-protected services to end users. In order to ...
Weishan Zhang, Julian Schütte, Mads Ingstrup,...
COMPUTER
2004
61views more  COMPUTER 2004»
15 years 4 months ago
Routing and Security in Mobile Ad Hoc Networks
Nikola Milanovic, Miroslaw Malek, Anthony Davidson...
COMPUTER
1998
69views more  COMPUTER 1998»
15 years 4 months ago
Integrating Security into the Curriculum
Cynthia E. Irvine, Shiu-Kai Chin, Deborah A. Frinc...
138
Voted
TAMC
2009
Springer
15 years 11 months ago
Best-Order Streaming Model
We study a new model of computation called stream checking on graph problems where a space-limited verifier has to verify a proof sequentially (i.e., it reads the proof as a strea...
Atish Das Sarma, Richard J. Lipton, Danupon Nanong...
130
Voted
CHIMIT
2008
ACM
15 years 6 months ago
Guidelines for designing IT security management tools
An important factor that impacts the effectiveness of security systems within an organization is the usability of security management tools. In this paper, we present a survey of ...
Pooya Jaferian, David Botta, Fahimeh Raja, Kirstie...