Sciweavers

2213 search results - page 345 / 443
» Software Security
Sort
View
126
Voted
TR
2008
98views more  TR 2008»
15 years 3 months ago
Application of Vulnerability Discovery Models to Major Operating Systems
A number of security vulnerabilities have been reported in the Windows, and Linux operating systems. Both the developers, and users of operating systems have to utilize significant...
Omar H. Alhazmi, Yashwant K. Malaiya
CLUSTER
2002
IEEE
15 years 3 months ago
Condor-G: A Computation Management Agent for Multi-Institutional Grids
In recent years, there has been a dramatic increase in the amount of available computing and storage resources. Yet few have been able to exploit these resources in an aggregated ...
James Frey, Todd Tannenbaum, Miron Livny, Ian T. F...
CSCW
2002
ACM
15 years 3 months ago
Collaboration as an Activity Coordinating with Pseudo-Collective Objects
A coalition is a collaborative pattern in which people must work together to accomplish a task, but where organizational constraints stand in the way of their making use of the co...
David Zager
INFFUS
2002
162views more  INFFUS 2002»
15 years 3 months ago
Fusion of multiple classifiers
The security of computer networks plays a strategic role in modern computer systems. In order to enforce high protection levels against threats, a number of software tools have be...
Fabio Roli, Josef Kittler
CISC
2009
Springer
186views Cryptology» more  CISC 2009»
15 years 1 months ago
Hardware Framework for the Rabbit Stream Cipher
Rabbit is a software-oriented synchronous stream cipher with very strong security properties and support for 128-bit keys. Rabbit is part of the European Union's eSTREAM portf...
Deian Stefan