Sciweavers

151 search results - page 26 / 31
» Considering Operational Security Risk during System Developm...
Sort
View
SIGSOFT
2008
ACM
14 years 10 months ago
Requirements engineering: from craft to discipline
Getting the right software requirements under the right environment assumptions is a critical precondition for developing the right software. This task is intrinsically difficult....
Axel van Lamsweerde
CCS
2008
ACM
13 years 11 months ago
Mitigating DNS DoS attacks
This paper considers DoS attacks on DNS wherein attackers flood the nameservers of a zone to disrupt resolution of resource records belonging to the zone and consequently, any of ...
Hitesh Ballani, Paul Francis
IEEEARES
2010
IEEE
14 years 4 months ago
FedWare: Middleware Services to Cope with Information Consistency in Federated Identity Management
—Collaborations by the use of inter-organizational business processes can help companies to achieve a competitive edge over competing businesses. Typically, these collaborations ...
Thorsten Höllrigl, Jochen Dinger, Hannes Hart...
SAC
2009
ACM
14 years 1 months ago
Autonomous networked robots for the establishment of wireless communication in uncertain emergency response scenarios
During a disaster, emergency response operations can benefit from the establishment of a wireless ad hoc network. We propose the use of autonomous robots that move inside a disas...
Stelios Timotheou, Georgios Loukas
IROS
2008
IEEE
117views Robotics» more  IROS 2008»
14 years 3 months ago
Kinodynamic motion planning with hardware demonstrations
Abstract— This paper provides proof-of-concept that stateof-the-art sampling-based motion planners that are tightly integrated with a physics-based simulator can compute paths th...
Ioan Alexandru Sucan, Jonathan F. Kruse, Mark Yim,...