Sciweavers

852 search results - page 170 / 171
» Understanding How the Requirements Are Implemented in Source...
Sort
View
NTMS
2009
IEEE
14 years 1 months ago
Q-ESP: A QoS-Compliant Security Protocol to Enrich IPSec Framework
—IPSec is a protocol that allows to make secure connections between branch offices and allows secure VPN accesses. However, the efforts to improve IPSec are still under way; one ...
Mahmoud Mostafa, Anas Abou El Kalam, Christian Fra...
SASN
2006
ACM
14 years 6 days ago
Autonomous and distributed node recovery in wireless sensor networks
Intrusion or misbehaviour detection systems are an important and widely accepted security tool in computer and wireless sensor networks. Their aim is to detect misbehaving or faul...
Mario Strasser, Harald Vogt
ESCIENCE
2005
IEEE
13 years 12 months ago
Distributed, Parallel Web Service Orchestration Using XSLT
GridXSLT is an implementation of the XSLT programming language designed for distributed web service orchestration. Based on the functional semantics of the language, it compiles p...
Peter M. Kelly, Paul D. Coddington, Andrew L. Wend...
ATAL
2004
Springer
13 years 11 months ago
Toward Trustworthy Adjustable Autonomy in KAoS
Trust is arguably the most crucial aspect of agent acceptability. At its simplest level, it can be characterized in terms of judgments that people make concerning three factors: an...
Jeffrey M. Bradshaw, Hyuckchul Jung, Shriniwas Kul...
DSN
2006
IEEE
13 years 10 months ago
Efficiently Detecting All Dangling Pointer Uses in Production Servers
In this paper, we propose a novel technique to detect all dangling pointer uses at run-time that is efficient enough for production use in server codes. One idea (previously used ...
Dinakar Dhurjati, Vikram S. Adve