Sciweavers

2810 search results - page 421 / 562
» Contract-Based Component System Design
Sort
View
HICSS
2008
IEEE
136views Biometrics» more  HICSS 2008»
15 years 5 months ago
Tag Clouds: Data Analysis Tool or Social Signaller?
We examine the recent information visualization phenomenon known as tag clouds, which are an interesting combination of data visualization, web design element, and social marker. ...
Marti A. Hearst, Daniela Karin Rosner
COMSWARE
2007
IEEE
15 years 5 months ago
A Parallelization of ECDSA Resistant to Simple Power Analysis Attacks
The Elliptic Curve Digital Signature Algorithm admits a natural parallelization wherein the point multiplication step can be split in two parts and executed in parallel. Further pa...
Sarang Aravamuthan, Viswanatha Rao Thumparthy
IPPS
2005
IEEE
15 years 4 months ago
A Compiler and Runtime Infrastructure for Automatic Program Distribution
This paper presents the design and the implementation of a compiler and runtime infrastructure for automatic program distribution. We are building a research infrastructure that e...
Roxana Diaconescu, Lei Wang, Zachary Mouri, Matt C...
WOWMOM
2005
ACM
201views Multimedia» more  WOWMOM 2005»
15 years 4 months ago
Real-Time Intrusion Detection for Ad Hoc Networks
A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. The widely accepted existing routing protocols de...
Ioanna Stamouli, Patroklos G. Argyroudis, Hitesh T...
SAC
2004
ACM
15 years 4 months ago
Using mobile agents as roaming security guards to test and improve security of hosts and networks
1 This paper discusses the design and implementation details of MAST (Mobile Agent-based Security Tool), a new mobile agentbased network security approach. MAST has been designed t...
Marco M. Carvalho, Thomas B. Cowin, Niranjan Suri,...