Sciweavers

8468 search results - page 66 / 1694
» The Technology of Data Stashing
Sort
View
JTRES
2009
ACM
15 years 2 months ago
A technology compatibility kit for safety critical Java
Safety Critical Java is a specification being built on top a subset of interfaces from the Real-Time Specification for Java. It is designed to ease development and analysis of s...
Lei Zhao, Daniel Tang, Jan Vitek
WSC
2008
15 years 3 days ago
Demand forecast of semiconductor products based on technology diffusion
Demand forecast plays a critical role to determine capital investment for capacity planning. Given the involved uncertainties and long lead-time for capacity expansion, semiconduc...
Chen-Fu Chien, Yun-Ju Chen, Jin-Tang Peng
EUC
2008
Springer
14 years 11 months ago
A Qualitative Risk Analysis for the GPRS Technology
This paper presents a qualitative risk analysis of the General Packet Radio Service (GPRS) technology. GPRS presents several essential security weaknesses which may lead to securi...
Christos Xenakis, Danae Apostolopoulou, Angeliki P...
IADIS
2004
14 years 11 months ago
A distributed monitoring system with global network and Web technology
A distributed monitoring system has been developed, which is organized with network cameras, an integrated web/mail server, web-based clients including high-performance cellular p...
Yoshiro Imai, Daisuke Yamane, Osamu Sadayuki
AUSFORENSICS
2003
14 years 11 months ago
Identifying Trends in the Deployment and Security of 802.11b Wireless Technology, in Perth, W.A
Many organisations and individuals are installing wireless local area networks (WLANs), which are based on the IEEE 802.11b standard. Insecurely configured WLANs present a threat ...
Sue Webb