Sciweavers

875 search results - page 157 / 175
» Requirements for Context-Dependent Mobile Access to Informat...
Sort
View
ETS
2000
IEEE
220views Hardware» more  ETS 2000»
14 years 9 months ago
Law On-Line: A Collaborative, Web-Based Journey in the Law and Social Sciences
During Spring 1998, we embarked on pedagogical journey into unknown terrains -- the terrains of collaborative teaching and World Wide Web instruction. In this paper we present a j...
Cynthia L. Cates, Wayne V. McIntosh
75
Voted
SP
2008
IEEE
138views Security Privacy» more  SP 2008»
15 years 4 months ago
Practical Proactive Integrity Preservation: A Basis for Malware Defense
Unlike today’s reactive approaches, information flow based approaches can provide positive assurances about overall system integrity, and hence can defend against sophisticated...
Weiqing Sun, R. Sekar, Gaurav Poothia, Tejas Karan...
ACSAC
2007
IEEE
15 years 4 months ago
Secure Input for Web Applications
The web is an indispensable part of our lives. Every day, millions of users purchase items, transfer money, retrieve information and communicate over the web. Although the web is ...
Martin Szydlowski, Christopher Kruegel, Engin Kird...
FODO
1993
Springer
110views Algorithms» more  FODO 1993»
15 years 1 months ago
Storage System Architectures for Continuous Media Data
Abstract. Data storage systems are being called on to manage continuous media data types, such as digital audio and video. There is a demand by applications for \constrained-latenc...
David Maier, Jonathan Walpole, Richard Staehli
NTMS
2009
IEEE
15 years 4 months ago
Q-ESP: A QoS-Compliant Security Protocol to Enrich IPSec Framework
—IPSec is a protocol that allows to make secure connections between branch offices and allows secure VPN accesses. However, the efforts to improve IPSec are still under way; one ...
Mahmoud Mostafa, Anas Abou El Kalam, Christian Fra...