Sciweavers

276 search results - page 36 / 56
» Security in Context: Analysis and Refinement of Software Arc...
Sort
View
87
Voted
COMPSAC
2006
IEEE
15 years 3 months ago
Automated Agent Synthesis for Situation Awareness in Service-Based Systems
Service-based systems have many applications, such as collaborative research and development, e-business, health care, military applications, and homeland security. In dynamic ser...
Stephen S. Yau, Haishan Gong, Dazhi Huang, Wei Gao...
111
Voted
ICWSM
2009
14 years 7 months ago
Gephi: An Open Source Software for Exploring and Manipulating Networks
Gephi is an open source software for graph and network analysis. It uses a 3D render engine to display large networks in real-time and to speed up the exploration. A flexible and ...
Mathieu Bastian, Sebastien Heymann, Mathieu Jacomy
68
Voted
VLSID
2003
IEEE
208views VLSI» more  VLSID 2003»
15 years 2 months ago
Cryptosystem Designed for Embedded System Security
— This paper reports a cryptosystem designed for security of embedded systems. It is based on the theory of Cellular Automata(CA). The Cellular Automata based Cryptosystem(CAC) e...
Subhayan Sen, Sk. Iqbal Hossain, Kabirul Islam, Di...
CAI
2006
Springer
14 years 9 months ago
Analysis and Design of Mobile Collaborative Applications Using Contextual Elements
Collaborative mobile applications support users on the move in order to perform a collaborative task. One of the challenges when designing such applications is to consider the cont...
Rosa Alarcón, Luis A. Guerrero, Sergio F. O...
90
Voted
MSWIM
2006
ACM
15 years 3 months ago
Two methods of authenticated positioning
Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept a...
Thomas Mundt