Sciweavers

6907 search results - page 950 / 1382
» Securing distributed adaptation
Sort
View
126
Voted
ENTCS
2008
79views more  ENTCS 2008»
15 years 3 months ago
j-POST: a Java Toolchain for Property-Oriented Software Testing
Abstract. j-POST is an integrated toolchain for property-oriented software testing. This toolchain includes a test designer, a test generator, and a test execution engine. The test...
Yliès Falcone, Laurent Mounier, Jean-Claude...
137
Voted
IEEESP
2008
136views more  IEEESP 2008»
15 years 3 months ago
The Crutial Way of Critical Infrastructure Protection
Today, critical infrastructures like the power grid are essentially physical processes controlled by computers connected by networks. They are usually as vulnerable as any other i...
Alysson Neves Bessani, Paulo Sousa, Miguel Correia...
103
Voted
COMCOM
2006
62views more  COMCOM 2006»
15 years 3 months ago
Self-monitoring of wireless sensor networks
This paper presents an efficient distributed self-monitoring mechanism for a class of wireless sensor networks used for monitoring and surveillance. In these applications, it is i...
Chih-fan Hsin, Mingyan Liu
109
Voted
IJOE
2008
107views more  IJOE 2008»
15 years 3 months ago
SOA Meets Robots - A Service-Based Software Infrastructure for Remote Laboratories
With the ongoing internationalization of virtual laboratories, the integration of such infrastructures becomes more important. The meanwhile commonly accepted 'glue' for...
Peter Tröger, Andreas Rasche, Frank Feinbube,...
IJNSEC
2006
98views more  IJNSEC 2006»
15 years 3 months ago
Comment on Improvement of the Miyazaki-Takaragi Threshold Digital Signature Scheme
To enhance applications of smart cards, Miyazaki and Takaragi proposed a (t, n) threshold digital signature scheme based on the security of elliptic curve discrete logarithm (ECDL...
Zuhua Shao