Sciweavers

434 search results - page 83 / 87
» Addressing IT Security for Critical Control Systems
Sort
View
BMCBI
2005
161views more  BMCBI 2005»
13 years 7 months ago
Non-linear mapping for exploratory data analysis in functional genomics
Background: Several supervised and unsupervised learning tools are available to classify functional genomics data. However, relatively less attention has been given to exploratory...
Francisco Azuaje, Haiying Wang, Alban Chesneau
MIDDLEWARE
2004
Springer
14 years 28 days ago
PoliPer: policies for mobile and pervasive environments
The need for sharing is well known in a large number of distributed applications. These applications are difficult to develop either for fully wired or mobile wireless networks. ...
Luís Veiga, Paulo Ferreira
ATC
2006
Springer
13 years 11 months ago
Ubisafe Computing: Vision and Challenges (I)
In recent years, a variety of new computing paradigms have been proposed for various purposes. It is true that many of them intend to and really can gratify some of the people some...
Jianhua Ma, Qiangfu Zhao, Vipin Chaudhary, Jingde ...
ICSE
2005
IEEE-ACM
14 years 7 months ago
Deciding what to design: closing a gap in software engineering education
Software has jumped "out of the box" ? it controls critical systems, pervades business and commerce, and infuses entertainment, communication, and other everyday activiti...
Mary Shaw, James D. Herbsleb, Ipek Ozkaya
ICC
2007
IEEE
108views Communications» more  ICC 2007»
14 years 1 months ago
Flow Management for SIP Application Servers
—In this paper, we study how to build a front-end flow management system for SIP application servers. This is challenging because of some special characteristics of SIP and SIP a...
Jing Sun, Jinfeng Hu, Ruixiong Tian, Bo Yang