Sciweavers

14824 search results - page 2721 / 2965
» Security - Introduction
Sort
View
COMCOM
2006
93views more  COMCOM 2006»
15 years 3 months ago
On scalability properties of the Hi3 control plane
The Host Identity Indirection Infrastructure (Hi3) is a general-purpose networking architecture, derived from the Internet Indirection Infrastructure (i3) and the Host Identity Pr...
Dmitry Korzun, Andrei Gurtov
CONCURRENCY
2006
111views more  CONCURRENCY 2006»
15 years 3 months ago
ScyFlow: an environment for the visual specification and execution of scientific workflows
With the advent of grid technologies, scientists and engineers are building more and more complex applications to utilize distributed grid resources. The core grid services provid...
Karen M. McCann, Maurice Yarrow, Adrian De Vivo, P...
CORR
2006
Springer
77views Education» more  CORR 2006»
15 years 2 months ago
Prioritizing Software Inspection Results using Static Profiling
Static software checking tools are useful as an additional automated software inspection step that can easily be integrated in the development cycle and assist in creating secure,...
Cathal Boogerd, Leon Moonen
CSSE
2006
IEEE
15 years 2 months ago
Experimental analysis of a privacy-preserving scalar product protocol
The recent investigation of privacy-preserving data mining has been motivated by the growing concern about the privacy of individuals when their data is stored, aggregated, and mi...
Zhiqiang Yang, Rebecca N. Wright, Hiranmayee Subra...
DI
2006
67views more  DI 2006»
15 years 2 months ago
A portable network forensic evidence collector
A small portable network forensic evidence collection device is presented which is built using inexpensive embedded hardware and open source software. The device oers several mode...
Bruce J. Nikkel
« Prev « First page 2721 / 2965 Last » Next »