Sciweavers

2458 search results - page 341 / 492
» Database-Management Principles And Applications
Sort
View
AOSD
2009
ACM
15 years 4 months ago
Enforcing security for desktop clients using authority aspects
Desktop client applications interact with both local and remote resources. This is both a benefit in terms of the rich features desktop clients can provide, but also a security r...
Brett Cannon, Eric Wohlstadter
SAC
2009
ACM
15 years 4 months ago
Dynamic planning and weaving of dependability concerns for self-adaptive ubiquitous services
Ubiquitous computing and service-oriented computing enable the development of a new trend of applications that can opportunely interact with services discovered in the surrounding...
Romain Rouvoy, Frank Eliassen, Mikaël Beauvoi...
ICC
2009
IEEE
152views Communications» more  ICC 2009»
15 years 4 months ago
On Concurrent Multipath Transfer in SCTP-Based Handover Scenarios
Abstract—Handling mobility at the transport layer is a promising approach to achieve seamless handover in the context of heterogeneous wireless access networks. In particular, fe...
Lukasz Budzisz, Ramon Ferrús, Ferran Casade...
ACMSE
2009
ACM
15 years 4 months ago
Bit vector algorithms enabling high-speed and memory-efficient firewall blacklisting
In a world of increasing Internet connectivity coupled with increasing computer security risks, security conscious network applications implementing blacklisting technology are be...
J. Lane Thames, Randal Abler, David Keeling
ICARCV
2008
IEEE
154views Robotics» more  ICARCV 2008»
15 years 4 months ago
Detecting spurious features using parity space
—Detection of spurious features is instrumental in many computer vision applications. The standard approach is feature based, where extracted features are matched between the ima...
David Törnqvist, Thomas B. Schön, Fredri...