Sciweavers

1229 search results - page 241 / 246
» Graph-Based Design and Analysis of Dynamic Software Architec...
Sort
View
IEEESP
2007
98views more  IEEESP 2007»
14 years 11 months ago
Educating Students to Create Trustworthy Systems
igh level of abstraction and to provide broad oversight. In contrast, the goal of computer science security education is to provide the technicalexpertisetodevelopsecure software a...
Richard S. Swart, Robert F. Erbacher
WWW
2007
ACM
16 years 10 days ago
Turning portlets into services: the consumer profile
Portlets strive to play at the front end the same role that Web services currently enjoy at the back end, namely, enablers of application assembly through reusable services. Howev...
Oscar Díaz, Salvador Trujillo, Sandy P&eacu...
HPDC
2009
IEEE
15 years 6 months ago
Maintaining reference graphs of globally accessible objects in fully decentralized distributed systems
Since the advent of electronic computing, the processors’ clock speed has risen tremendously. Now that energy efficiency requirements have stopped that trend, the number of proc...
Björn Saballus, Thomas Fuhrmann
GI
2004
Springer
15 years 5 months ago
A Low-Cost Solution for Frequent Symmetric Key Exchange in Ad-hoc Networks
: Next to authentication, secure key exchange is considered the most critical and complex issue regarding ad-hoc network security. We present a low-cost, (i.e. low hardware-complex...
Markus Volkmer, Sebastian Wallner
109
Voted
DGO
2007
174views Education» more  DGO 2007»
15 years 1 months ago
New techniques for ensuring the long term integrity of digital archives
A large portion of the government, business, cultural, and scientific digital data being created today needs to be archived and preserved for future use of periods ranging from a ...
Sangchul Song, Joseph JáJá