Sciweavers

8808 search results - page 1593 / 1762
» Process of Software Evolution
Sort
View
150
Voted
DBSEC
2003
149views Database» more  DBSEC 2003»
15 years 6 months ago
Anti-Tamper Databases: Querying Encrypted Databases
With mobile computing and powerful laptops, databases with sensitive data can be physically retrieved by malicious users who can employ techniques that were not previously thought...
Gultekin Özsoyoglu, David A. Singer, Sun S. C...
GRAPHICSINTERFACE
2001
15 years 6 months ago
Novel Solver for Dynamic Surfaces
Physics-based modeling integrates dynamics and geometry. The standard methods to solve the Lagrangian equations use a direct approach in the spatial domain. Though extremely power...
Sumantro Ray, Hong Qin
ISSA
2004
15 years 6 months ago
A Logic-Based Access Control Approach For Web Services
Web Services technology enables organisations to exploit software as a service. Services are accessed by method invocations. Method interfaces are described and published, and may...
Marijke Coetzee
IADIS
2003
15 years 6 months ago
DENOFAS: A Vulnerability Assessment Tool
This paper describes the development of a software tool for detection of vulnerabilities in networked systems, using public available security resources. Our tool builds is knowle...
Rui Costa Cardoso, Mário M. Freire
PDCN
2004
15 years 6 months ago
Design and implementation of a network simulation system
In this paper, an efficient tool has been designed and implemented to design and analyze the communication networks. A network simulator in software is valuable for network manage...
Jae-Weon Choi, Man-Hui Lee
« Prev « First page 1593 / 1762 Last » Next »