Sciweavers

1770 search results - page 168 / 354
» Writing requirements in computer security
Sort
View
104
Voted
CCS
2003
ACM
15 years 3 months ago
Establishing pairwise keys in distributed sensor networks
Pairwise key establishment is a fundamental security service in sensor networks; it enables sensor nodes to communicate securely with each other using cryptographic techniques. Ho...
Donggang Liu, Peng Ning
CSFW
2004
IEEE
15 years 2 months ago
Using Active Learning in Intrusion Detection
Intrusion Detection Systems (IDSs) have become an important part of operational computer security. They are the last line of defense against malicious hackers and help detect ongo...
Magnus Almgren, Erland Jonsson
74
Voted
ITICSE
2005
ACM
15 years 3 months ago
Iconic programming for flowcharts, java, turing, etc
One of the largest barriers to learning programming is the precise and complex syntax required to write programs. This barrier is a key impediment to the integration of programmin...
Stephen Chen, Stephen Morris
SC
2003
ACM
15 years 3 months ago
Nondeterministic Queries in a Relational Grid Information Service
A Grid Information Service (GIS) stores information about the resources of a distributed computing environment and answers questions about it. We are developing RGIS, a GIS system...
Peter A. Dinda, Dong Lu
102
Voted
DSVIS
2008
Springer
15 years 1 days ago
ReWiRe: Designing Reactive Systems for Pervasive Environments
The design of interactive software that populates an ambient space is a complex and ad-hoc process with traditional software development approaches. In an ambient space, important ...
Geert Vanderhulst, Kris Luyten, Karin Coninx