Sciweavers

6025 search results - page 1126 / 1205
» Flexibility in Service Processes
Sort
View
ENTCS
2007
88views more  ENTCS 2007»
15 years 23 days ago
Keeping Secrets in Resource Aware Components
We present a powerful and flexible method for automatically checking the secrecy of values inside components. In our framework an attacker may monitor the external communication ...
Tom Chothia, Jun Pang, Muhammad Torabi Dashti
93
Voted
MJ
2006
89views more  MJ 2006»
15 years 23 days ago
RTDT: A static QoS manager, RT scheduling, HW/SW partitioning CAD tool
The Hardware (HW)/Software (SW) partitioning/scheduling relies on two subtasks : the cost function and the real time (RT) analysis. Besides these two subtasks, the proposed generi...
Hedi Tmar, Jean-Philippe Diguet, Abdenour Azzedine...
166
Voted
PE
2006
Springer
193views Optimization» more  PE 2006»
15 years 22 days ago
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
SIGCSE
2008
ACM
155views Education» more  SIGCSE 2008»
15 years 22 days ago
Towards a top-down approach to teaching an undergraduate grid computing course
Early undergraduate Grid computing courses generally took a bottom-up approach to Grid computing education starting with network protocols, client-server concepts, creating Web an...
Barry Wilkinson, Clayton Ferner
118
Voted
SIGCSE
2008
ACM
104views Education» more  SIGCSE 2008»
15 years 22 days ago
Inspiring blind high school students to pursue computer science with instant messaging chatbots
Blind students are an underrepresented group in computer science. In this paper, we describe our experience preparing and leading the computer science track at the National Federa...
Jeffrey P. Bigham, Maxwell B. Aller, Jeremy T. Bru...
« Prev « First page 1126 / 1205 Last » Next »