Sciweavers

2560 search results - page 109 / 512
» Securing VO Management
Sort
View
CASCON
1996
126views Education» more  CASCON 1996»
15 years 5 months ago
Evaluating the costs of management: a distributed applications management testbed
In today's distributed computing environments, users are makingincreasing demands on the systems, networks, and applications they use. Users are coming to expect performance,...
Michael Katchabaw, Stephen L. Howard, Andrew D. Ma...
SEC
2003
15 years 5 months ago
Assessing Security in Energy-Efficient Sensor Networks
In this paper, we describe why current research in ad hoc networks requires an effective assessment framework, and how our system profile proposal can be used for the purpose. W...
Yee Wei Law, Sandro Etalle, Pieter H. Hartel
ICST
2009
IEEE
15 years 11 months ago
Quality Assurance of Software Applications Using the In Vivo Testing Approach
Software products released into the field typically have some number of residual defects that either were not detected or could not have been detected during testing. This may be...
Christian Murphy, Gail E. Kaiser, Ian Vo, Matt Chu
HOTNETS
2010
14 years 11 months ago
HTTP as the narrow waist of the future internet
Over the past decade a variety of network architectures have been proposed to address IP's limitations in terms of flexible forwarding, security, and data distribution. Meanw...
Lucian Popa 0002, Ali Ghodsi, Ion Stoica
IJNSEC
2010
247views more  IJNSEC 2010»
14 years 11 months ago
Hardware Implementation of Efficient Modified Karatsuba Multiplier Used in Elliptic Curves
The efficiency of the core Galois field arithmetic improves the performance of elliptic curve based public key cryptosystem implementation. This paper describes the design and imp...
Sameh M. Shohdy, Ashraf El-Sisi, Nabil A. Ismail