Sciweavers

2363 search results - page 435 / 473
» How Secure is RFID
Sort
View
124
Voted
DKE
2007
75views more  DKE 2007»
15 years 4 months ago
Weaving temporal and reliability aspects into a schema tapestry
In aspect-oriented programming (AOP) a cross-cutting concern is implemented in an aspect. An aspect weaver blends code from the aspect into a program’s code at programmer-specifi...
Curtis E. Dyreson, Richard T. Snodgrass, Faiz Curr...
JSW
2008
127views more  JSW 2008»
15 years 4 months ago
A Trust Based System for Enhanced Spam Filtering
The effectiveness of current anti-spam systems is limited by the ability of spammers to adapt to filtering techniques and the lack of incentive for mail servers to filter outgoing ...
Jimmy McGibney, Dmitri Botvich
JWSR
2008
241views more  JWSR 2008»
15 years 4 months ago
A Model-Driven Development Framework for Non-Functional Aspects in Service Oriented Architecture
: Service Oriented Architecture (SOA) is an emerging style of software architectures to reuse and integrate existing systems for designing new applications. Each application is des...
Hiroshi Wada, Junichi Suzuki, Katsuya Oba
JSAC
2006
111views more  JSAC 2006»
15 years 4 months ago
On trust models and trust evaluation metrics for ad hoc networks
Within the realm of network security, we interpret the concept of trust as a relation among entities that participate in various protocols. Trust relations are based on evidence cr...
George Theodorakopoulos, John S. Baras
129
Voted
SIGCSE
2008
ACM
128views Education» more  SIGCSE 2008»
15 years 4 months ago
Cybercivics: a novel approach to reaching k-12 students with the social relevance of computer science
This paper describes CyberCivics, a novel approach to computer science outreach that integrates hands-on computing experiences with the study of contemporary social and political ...
Jim Owens, Jeanna Matthews