Sciweavers

2616 search results - page 494 / 524
» Knowledge Management
Sort
View
SACMAT
2009
ACM
15 years 4 months ago
Symbolic reachability analysis for parameterized administrative role based access control
Role based access control (RBAC) is a widely used access control paradigm. In large organizations, the RBAC policy is managed by multiple administrators. An administrative role ba...
Scott D. Stoller, Ping Yang, Mikhail I. Gofman, C....
84
Voted
ICC
2008
IEEE
126views Communications» more  ICC 2008»
15 years 4 months ago
Discovering Packet Structure through Lightweight Hierarchical Clustering
— The complexity of current Internet applications makes the understanding of network traffic a challenging task. By providing larger-scale aggregates for analysis, unsupervised ...
Abdulrahman Hijazi, Hajime Inoue, Ashraf Matrawy, ...
IISWC
2008
IEEE
15 years 4 months ago
Workload characterization of selected JEE-based Web 2.0 applications
Web 2.0 represents the evolution of the web from a source of information to a platform. Network advances have permitted users to migrate from desktop applications to so-called Ric...
Priya Nagpurkar, William Horn, U. Gopalakrishnan, ...
WIMOB
2007
IEEE
15 years 4 months ago
A New Protocol for Securing Wireless Sensor Networks against Nodes Replication Attacks
—The low-cost, unattended nature and the capability of self-organizing of sensors, yield the use of Wireless Sensor Networks (WSN) very popular to day. Unfortunately, the unshiel...
Chakib Bekara, Maryline Laurent-Maknavicius
ECSA
2007
Springer
15 years 3 months ago
Pattern-Based Evolution of Software Architectures
Abstract. We propose a pattern-based software development method comprising analysis (using problem frames) and design (using architectural and design patterns), of which especiall...
Isabelle Côté, Maritta Heisel, Ina We...