Sciweavers

16934 search results - page 3313 / 3387
» Offshoring Information Technology
Sort
View
MMMACNS
2005
Springer
15 years 3 months ago
A Passive External Web Surveillance Technique for Private Networks
The variety and richness of what users browse on the Internet has made the communications of web-browsing hosts an attractive target for surveillance. We show that passive external...
Constantine Daicos, Scott Knight
MMMACNS
2005
Springer
15 years 3 months ago
Networks, Markov Lie Monoids, and Generalized Entropy
The continuous general linear group in n dimensions can be decomposed into two Lie groups: (1) an n(n-1) dimensional ‘Markov type’ Lie group that is defined by preserving the ...
Joseph E. Johnson
MMMACNS
2005
Springer
15 years 3 months ago
A Modal Logic for Role-Based Access Control
Making correct access-control decisions is central to security, which in turn requires accounting correctly for the identity, credentials, roles, authority, and privileges of users...
Thumrongsak Kosiyatrakul, Susan Older, Shiu-Kai Ch...
MMMACNS
2005
Springer
15 years 3 months ago
Models and Analysis of Active Worm Defense
Abstract. The recent proliferation of Internet worms has raised questions about defensive measures. To date most techniques proposed are passive, in-so-far as they attempt to block...
David M. Nicol, Michael Liljenstam
SCHULE
2005
Springer
15 years 3 months ago
Programmierparadigmen mit Scheme
: Der Beitrag diskutiert Erfahrungen aus einem Kurs, in dem zahlreiche Inhalte des Informatiklehrplanes der Klassenstufen 11 und 12 mit funktionsorientierter Programmierung handlun...
Veit Berger, Christian Wagenknecht
« Prev « First page 3313 / 3387 Last » Next »