Sciweavers

2139 search results - page 111 / 428
» Distributed computing and computer security education
Sort
View
CORR
2011
Springer
167views Education» more  CORR 2011»
14 years 6 months ago
The weak password problem: chaos, criticality, and encrypted p-CAPTCHAs
- Vulnerabilities related to weak passwords are a pressing global economic and security issue. We report a novel, simple, and effective approach to address the weak password probl...
T. V. Laptyeva, S. Flach, K. Kladko
115
Voted
CORR
2002
Springer
92views Education» more  CORR 2002»
15 years 2 months ago
Neutrality: A Necessity for Self-Adaptation
Self-adaptation is used in all main paradigms of evolutionary computation to increase efficiency. We claim that the basis of self-adaptation is the use of neutrality. In the absenc...
Marc Toussaint, Christian Igel
WISE
2009
Springer
16 years 3 hour ago
Security Policy Definition Framework for SOA-Based Systems
This paper presents an extended architecture of a policy definition framework fine-tuned for service-oriented environments conforming to the SOA distributed processing paradigm. We...
Bartosz Brodecki, Piotr Sasak, Michal Szychowiak
ECIS
2003
15 years 4 months ago
Re-negotiating protocols: a way to integrate groupware in collaborative learning settings
Research is being done within the Computer Supported Collaborative Learning community to investigate how to apply the approach of Problem Oriented Project Pedagogy in distance lea...
Pernille Bjørn Rasmussen
GRID
2006
Springer
15 years 2 months ago
A Framework for Secure End-to-End Delivery of Messages in Publish/Subscribe Systems
In the paper we present a framework for the secure end-to-end delivery of messages in distributed messaging infrastructures based on the publish/subscribe paradigm. The framework ...
Shrideep Pallickara, Marlon E. Pierce, Harshawardh...