Sciweavers

2154 search results - page 419 / 431
» Evidence-based software production
Sort
View
SAINT
2003
IEEE
15 years 3 months ago
Jini Meets UPnP: An Architecture for Jini/UPnP Interoperability
A service discovery framework provides a collection of protocols for developing dynamic client/server applications, allowing clients to find and use services without any previous ...
Jérémie Allard, V. Chinta, S. Gundal...
SISW
2003
IEEE
15 years 3 months ago
Memories: A Survey of Their Secure Uses in Smart Cards
— Smart cards are widely known for their tamper resistance, but only contain a small amount of memory. Though very small, this memory often contains highly valuable information (...
Michael Neve, Eric Peeters, David Samyde, Jean-Jac...
79
Voted
NSPW
2003
ACM
15 years 3 months ago
SELF: a transparent security extension for ELF binaries
The ability to analyze and modify binaries is often very useful from a security viewpoint. Security operations one would like to perform on binaries include the ability to extract...
Daniel C. DuVarney, V. N. Venkatakrishnan, Sandeep...
SIGUCCS
2003
ACM
15 years 3 months ago
Teamwork is the heart of technology
IAT Services, the central Information Technology group at the University of Missouri-Columbia, operates computing sites in general access, classroom, and residence hall settings. ...
Tammy Hohlt, Kristina A. Cunningham
SIGUCCS
2003
ACM
15 years 3 months ago
Achieving rapid service deployment in an academic environment
Rapid product or service deployment is most commonly thought of in the corporate, rather than academic, environment. Utilizing a rapid deployment process and a number of highly de...
Shea Nangle