Sciweavers

5494 search results - page 1049 / 1099
» E-services Management Requirements
Sort
View
99
Voted
ACSAC
2009
IEEE
15 years 4 months ago
A Network Access Control Mechanism Based on Behavior Profiles
Abstract--Current Network Access Control (NAC) technologies manage the access of new devices into a network to prevent rogue devices from attacking network hosts or services. Typic...
Vanessa Frías-Martínez, Joseph Sherr...
AMOST
2007
ACM
15 years 4 months ago
Achieving both model and code coverage with automated gray-box testing
We have devised a novel technique to automatically generate test cases for a software system, combining black-box model-based testing with white-box parameterized unit testing. Th...
Nicolas Kicillof, Wolfgang Grieskamp, Nikolai Till...
ANCS
2007
ACM
15 years 4 months ago
On LID assignment in infiniBand networks
To realize a path in an InfiniBand network, an address, known as Local IDentifier (LID) in the InfiniBand specification, must be assigned to the destination and used in the forwar...
Wickus Nienaber, Xin Yuan, Zhenhai Duan
CASES
2007
ACM
15 years 4 months ago
Stack size reduction of recursive programs
For memory constrained environments like embedded systems, optimization for program size is often as important, if not more important, as optimization for execution speed. Commonl...
Stefan Schäckeler, Weijia Shang
ELPUB
2007
ACM
15 years 4 months ago
A Bachelor and Master Theses Portal : Specific Needs and Business Opportunities for the DoKS Repository Tool
A few years ago a portal for bachelor and master theses from Flemish university colleges was established by means of the open source repository software DoKS. At present approxima...
Rudi Baccarne
« Prev « First page 1049 / 1099 Last » Next »