Sciweavers

14824 search results - page 2531 / 2965
» Security - Introduction
Sort
View
KBSE
2007
IEEE
15 years 10 months ago
A dynamic birthmark for java
Code theft is a threat for companies that consider code as a core asset. A birthmark can help them to prove code theft by identifying intrinsic properties of a program. Two progra...
David Schuler, Valentin Dallmeier, Christian Lindi...
KBSE
2007
IEEE
15 years 10 months ago
Extracting rights and obligations from regulations: toward a tool-supported process
Security, privacy and governance are increasingly the focus of government regulations in the U.S., Europe and elsewhere. This trend has created a “regulation compliance” probl...
Nadzeya Kiyavitskaya, Nicola Zeni, Travis D. Breau...
MOBIQUITOUS
2007
IEEE
15 years 10 months ago
Temporary Interconnection of ZigBee Personal Area Network (PAN)
—ZigBee is popular for Wireless Sensor Network (WSN) devices because of its low power consumption, built-in security method and ratified specifications. With these features, it...
Sewook Jung, Alexander Chang, Mario Gerla
MUE
2007
IEEE
116views Multimedia» more  MUE 2007»
15 years 10 months ago
Towards High Quality Mobile Services for Senior Citizens in Smart Living Environments
The aging of our society presents a range of challenges to housing providers. With the advanced mobile technologies we are now able to develop quality mobile services to help seni...
Xiaosong Zheng, Petri Pulli
NCA
2007
IEEE
15 years 10 months ago
Decoupled Quorum-Based Byzantine-Resilient Coordination in Open Distributed Systems
Open distributed systems are typically composed by an unknown number of processes running in heterogeneous hosts. Their communication often requires tolerance to temporary disconn...
Alysson Neves Bessani, Miguel Correia, Joni da Sil...
« Prev « First page 2531 / 2965 Last » Next »