Sciweavers

2281 search results - page 278 / 457
» Security Patterns and Secure Systems Design
Sort
View
IRI
2006
IEEE
15 years 9 months ago
Rapid systems of systems integration - combining an architecture-centric approach with enterprise service bus infrastructure
Rapid, yet methodical, systems of systems integration is in high demand. Application areas such as homeland security and disaster response add to the challenge because of a unique...
Ingolf Krüger, Michael Meisinger, Massimilian...
JCP
2007
159views more  JCP 2007»
15 years 3 months ago
Authoring of Units of Learning via Dialogue Systems
— Detailed and expressive e-learning specifications like IMS LD [1] are necessary to create efficient e-learning applications. E-learning specifications that meet these demand...
Dietmar Janetzko
OOPSLA
2007
Springer
15 years 10 months ago
No ifs, ands, or buts: uncovering the simplicity of conditionals
Schematic tables are a new representation for conditionals. Roughly a cross between decision tables and data flow graphs, they represent computation and decision-making orthogona...
Jonathan Edwards
EUC
2005
Springer
15 years 9 months ago
A Hierarchical Anonymous Communication Protocol for Sensor Networks
Ensuring anonymity in sensor networks is a major security goal. Using traffic analysis, the attacker can compromise the network functionality by correlating data flow patterns to ...
Arjan Durresi, Vamsi Paruchuri, Mimoza Durresi, Le...
OOPSLA
2005
Springer
15 years 9 months ago
Roles of variables in object-oriented programming
Roles can be assigned to occurrences of variables in programs according to a small number of stereotypical patterns of use. Studies on explicitly teaching roles to novices learnin...
Pauli Byckling, Petri Gerdt, Jorma Sajaniemi