Sciweavers

5263 search results - page 103 / 1053
» Data sources selection for XML data sources
Sort
View
CCS
2011
ACM
13 years 9 months ago
How to break XML encryption
XML Encryption was standardized by W3C in 2002, and is implemented in XML frameworks of major commercial and open-source organizations like Apache, redhat, IBM, and Microsoft. It ...
Tibor Jager, Somorovsky Juraj
IJDE
2006
116views more  IJDE 2006»
14 years 9 months ago
Forensics and SIM Cards: An Overview
Nowadays there are many tools for the extraction of data objects [SWGDE] from SIM cards; unfortunately, most of them are proprietary, or their use is restricted to law enforcement...
Fabio Casadei, Antonio Savoldi, Paolo Gubian
GLOBECOM
2008
IEEE
14 years 10 months ago
Novel Rateless Coded Selection Cooperation in Dual-Hop Relaying Systems
Selection cooperation is proposed for rateless coded relaying by developing a novel low-complexity protocol that exploits all source-destination, source-relay, and relay-destinatio...
Reza Nikjah, Norman C. Beaulieu
ISCC
2009
IEEE
201views Communications» more  ISCC 2009»
15 years 4 months ago
Self-Selecting Reliable Path Routing in diverse Wireless Sensor Network environments
Routing protocols for Wireless Sensor Networks (WSN) face three major performance challenges. The first one is an efficient use of bandwidth that minimizes the transfer delay of p...
Thomas A. Babbitt, Christopher Morrell, Boleslaw K...
ICST
2008
IEEE
15 years 4 months ago
On Combining Multi-formalism Knowledge to Select Models for Model Transformation Testing
Testing remains a major challenge for model transformation development. Test models that are used as test data for model transformations, are constrained by various sources of kno...
Sagar Sen, Benoit Baudry, Jean-Marie Mottu