Sciweavers

1573 search results - page 269 / 315
» Strong User Authentication
Sort
View
ACSAC
2006
IEEE
15 years 3 months ago
Engineering Sufficiently Secure Computing
We propose an architecture of four complimentary technologies increasingly relevant to a growing number of home users and organizations: cryptography, separation kernels, formal v...
Brian Witten
AICT
2006
IEEE
128views Communications» more  AICT 2006»
15 years 3 months ago
Development of SOA-Based Software Systems - an Evolutionary Programming Approach
A software application has strong relationships with the business processes it supports. In the analysis phase those parts of the processes in which the software system is applied...
Christian Emig, Jochen Weisser, Sebastian Abeck
ICSM
2006
IEEE
15 years 3 months ago
Source Code Exploration with Google
The paper presents a new approach to source code exploration, which is the result of integrating the Google Desktop Search (GDS) engine into the Eclipse development environment. T...
Denys Poshyvanyk, Maksym Petrenko, Andrian Marcus,...
CSB
2005
IEEE
118views Bioinformatics» more  CSB 2005»
15 years 3 months ago
Gene Teams with Relaxed Proximity Constraint
Functionally related genes co-evolve, probably due to the strong selection pressure in evolution. Thus we expect that they are present in multiple genomes. Physical proximity amon...
Sun Kim, Jeong-Hyeon Choi, Jiong Yang
ICITA
2005
IEEE
15 years 3 months ago
WiFiAdmin: An Intelligent Web-Based Management Environment for Wireless Networks
Wireless network communities face a number of difficulties due to lack of integration between network and community resources management. In this work, we present a novel solution...
Eythimios Dimopoulos, Athanasios Panousis, Evangel...