Sciweavers

151 search results - page 26 / 31
» Considering Operational Security Risk during System Developm...
Sort
View
SIGSOFT
2008
ACM
16 years 3 months ago
Requirements engineering: from craft to discipline
Getting the right software requirements under the right environment assumptions is a critical precondition for developing the right software. This task is intrinsically difficult....
Axel van Lamsweerde
CCS
2008
ACM
15 years 4 months ago
Mitigating DNS DoS attacks
This paper considers DoS attacks on DNS wherein attackers flood the nameservers of a zone to disrupt resolution of resource records belonging to the zone and consequently, any of ...
Hitesh Ballani, Paul Francis
IEEEARES
2010
IEEE
15 years 9 months ago
FedWare: Middleware Services to Cope with Information Consistency in Federated Identity Management
—Collaborations by the use of inter-organizational business processes can help companies to achieve a competitive edge over competing businesses. Typically, these collaborations ...
Thorsten Höllrigl, Jochen Dinger, Hannes Hart...
144
Voted
SAC
2009
ACM
15 years 7 months ago
Autonomous networked robots for the establishment of wireless communication in uncertain emergency response scenarios
During a disaster, emergency response operations can benefit from the establishment of a wireless ad hoc network. We propose the use of autonomous robots that move inside a disas...
Stelios Timotheou, Georgios Loukas
IROS
2008
IEEE
117views Robotics» more  IROS 2008»
15 years 9 months ago
Kinodynamic motion planning with hardware demonstrations
Abstract— This paper provides proof-of-concept that stateof-the-art sampling-based motion planners that are tightly integrated with a physics-based simulator can compute paths th...
Ioan Alexandru Sucan, Jonathan F. Kruse, Mark Yim,...