Sciweavers

928 search results - page 97 / 186
» Safety management of complex technology
Sort
View
WETICE
1998
IEEE
15 years 2 months ago
Efficient Security for Large and Dynamic Multicast Groups
Proposals for multicast security that have been published so far are complex, often require trust in network components or are inefficient. In this paper we propose a series of no...
Germano Caronni, Marcel Waldvogel, Dan Sun, Bernha...
DASFAA
2007
IEEE
162views Database» more  DASFAA 2007»
14 years 10 months ago
Framework for Extending RFID Events with Business Rule
Radio frequency identification (RFID) technology is believed to be the next revolutionary step in supply-chain management. Complex process simplification using RFID technology can ...
Mikyeong Moon, Seongjin Kim, Keunhyuk Yeom, Heeseo...
BCSHCI
2009
14 years 7 months ago
User research in a scientific software development project
The Usable Image project provides usability and user-centred design support to a scientific software development project. OMERO is a complex software application aimed at supporti...
David Sloan, Catriona Macaulay, Paula Forbes, Scot...
ICCD
2004
IEEE
107views Hardware» more  ICCD 2004»
15 years 7 months ago
Network-on-Chip: The Intelligence is in The Wire
In this paper we describe how Network-on-Chip (NoC) will be the next major challenge to implementing complex and function-rich applications in advanced manufacturing processes at ...
Gérard Mas, Philippe Martin
SECURWARE
2008
IEEE
15 years 4 months ago
Polynomial Heuristic Algorithms for Inconsistency Characterization in Firewall Rule Sets
Firewalls provide the first line of defence of nearly all networked institutions today. However, Firewall ACLs could have inconsistencies, allowing traffic that should be denied o...
Sergio Pozo Hidalgo, Rafael Ceballos, Rafael M. Ga...