Sciweavers

2101 search results - page 252 / 421
» Engineering Services
Sort
View
COMPSAC
2009
IEEE
15 years 8 months ago
Leveraging Social Contacts for Message Confidentiality in Delay Tolerant Networks
Delay and disruption tolerant networks (DTNs) can bring much-needed networking capabilities to developing countries and rural areas. DTN features such as high node mobility and in...
Karim M. El Defrawy, John Solis, Gene Tsudik
122
Voted
COMPSAC
2009
IEEE
15 years 8 months ago
On a Classification Approach for SOA Vulnerabilities
Abstract--Vulnerabilities in operating systems and web applications have been and are being put into various classifications, leading to a better understanding of their causes and ...
Lutz Lowis, Rafael Accorsi
107
Voted
AUIC
2004
IEEE
15 years 8 months ago
e-Ghosts: Leaving Virtual Footprints in Ubiquitous Workspaces
Ubiquitous workspaces are future media-rich environments that employ new forms of operating systems and services to coordinate and manage interactions between people, multiple dis...
Michael Vernik, Steven Johnson, Rudi Vernik
ARCS
2006
Springer
15 years 8 months ago
Constraint-Based Deployment of Distributed Components in a Dynamic Network
Hierarchical software components offer interesting characteristics for the development of complex applications. However, supporting the deployment of such applications is difficult...
Didier Hoareau, Yves Mahéo
EUROMICRO
2004
IEEE
15 years 8 months ago
Intrusion Detection in Virtual Machine Environments
A virtual machine is a software replica of an underlying real machine. Multiple virtual machines can operate on the same host machine concurrently, without interfere each other. S...
Marcos Laureano, Carlos Maziero, Edgard Jamhour