Sciweavers

112 search results - page 16 / 23
» Efficiently Managing Security Concerns in Component Based Sy...
Sort
View
MMMACNS
2001
Springer
15 years 4 months ago
Typed MSR: Syntax and Examples
Abstract. Many design flaws and incorrect analyses of cryptographic protoAppeared in the Proceedings of the First International Workshop on Mathematical Methods, Models and Archit...
Iliano Cervesato
KDD
2003
ACM
114views Data Mining» more  KDD 2003»
16 years 10 hour ago
Information awareness: a prospective technical assessment
Recent proposals to apply data mining systems to problems in law enforcement, national security, and fraud detection have attracted both media attention and technical critiques of...
David Jensen, Matthew J. Rattigan, Hannah Blau
APSEC
2005
IEEE
15 years 1 months ago
Improving Agile Software Development using eXtreme AOCE and Aspect-Oriented CVS
Currently there are no Concurrent Versioning Systems (CVS) designed to properly support agile software development. The existing CVS lacks user friendliness and it requires users ...
Santokh Singh, Hsiao-Cheng Chen, Oliver Hunter, Jo...
90
Voted
ICCD
2004
IEEE
107views Hardware» more  ICCD 2004»
15 years 8 months ago
Network-on-Chip: The Intelligence is in The Wire
In this paper we describe how Network-on-Chip (NoC) will be the next major challenge to implementing complex and function-rich applications in advanced manufacturing processes at ...
Gérard Mas, Philippe Martin
VLDB
2007
ACM
295views Database» more  VLDB 2007»
15 years 5 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu