Sciweavers

2686 search results - page 437 / 538
» Using a neural network in the software testing process
Sort
View
SACMAT
2010
ACM
15 years 8 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
172
Voted
ENTCS
2008
390views more  ENTCS 2008»
15 years 1 months ago
Cryptographic Versus Trust-based Methods for MANET Routing Security
Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed infrastructure. Early routing protocols for MANETs failed to take security issues ...
Jared Cordasco, Susanne Wetzel
EAGC
2003
Springer
15 years 8 months ago
Decentralized vs. Centralized Economic Coordination of Resource Allocation in Grids
Application layer networks are software architectures that allow the provisioning of services requiring a huge amount of resources by connecting large numbers of individual compute...
Torsten Eymann, Michael Reinicke, Oscar Ardaiz, Pa...
KBSE
2003
IEEE
15 years 8 months ago
A Programmable Client-Server Model: Robust Extensibility via DSLs
The client-server model has been successfully used to support a wide variety of families of services in the context of distributed systems. However, its server-centric nature make...
Charles Consel, Laurent Réveillère
CSEE
2008
Springer
15 years 5 months ago
An Evaluation of a Mobile Game Concept for Lectures
This paper describes an evaluation of a new game concept, Lecture Quiz, which can be used in lectures in higher education to promote strong student participation and variation in ...
Alf Inge Wang, Terje Øfsdahl, Ole Kristian ...