Sciweavers

5722 search results - page 233 / 1145
» Security Function Interactions
Sort
View
ICPPW
2009
IEEE
15 years 23 days ago
A Security-Aware Approach to JXTA-Overlay Primitives
The JXTA-Overlay project is an effort to use JXTA technology to provide a generic set of functionalities that can be used by developers to deploy P2P applications. Since its desig...
Joan Arnedo-Moreno, Keita Matsuo, Leonard Barolli,...
COMSUR
2011
213views Hardware» more  COMSUR 2011»
14 years 2 months ago
Securing BGP - A Literature Survey
Abstract—The Border Gateway Protocol (BGP) is the Internet’s inter-domain routing protocol. One of the major concerns related to BGP is its lack of effective security measures,...
Geoff Huston, Mattia Rossi, Grenville J. Armitage
RECOMB
2006
Springer
16 years 3 months ago
Identification and Evaluation of Functional Modules in Gene Co-expression Networks
Abstract. Identifying gene functional modules is an important step towards elucidating gene functions at a global scale. In this paper, we introduce a simple method to construct ge...
Jianhua Ruan, Weixiong Zhang
PEPM
2007
ACM
15 years 9 months ago
Lowering: a static optimization technique for transparent functional reactivity
Functional Reactive Programming (frp) extends traditional functional programming with dataflow evaluation, making it possible to write interactive programs in a declarative style...
Kimberley Burchett, Gregory H. Cooper, Shriram Kri...
DSVIS
2003
Springer
15 years 8 months ago
Functionally Modeled User Interfaces
Modern industrial-strength user interface toolkits are usually described informally, in terms of implementation artifacts such as objects and imperative state. While the practical...
Antony Courtney