Sciweavers

2403 search results - page 336 / 481
» Cyberinsurance in IT Security Management
Sort
View
CSREASAM
2006
13 years 9 months ago
Cryptcoding - Encryption and Error-Correction Coding in a Single Step
In this paper we re-open a 25 years old question of joint encryption and error-correction coding, named here as Cryptcoding. Cryptcoding is a procedure in which encryption/decrypti...
Danilo Gligoroski, Svein J. Knapskog, Suzana Andov...
OOPSLA
2004
Springer
14 years 1 months ago
Hard real-time: C++ versus RTSJ
In the domain of hard real-time systems, which language is better: C++ or the Real-Time Specification for Java (RTSJ)? Although standard Java provides a more productive programmin...
Daniel L. Dvorak, William K. Reinholtz
COMPSAC
2009
IEEE
14 years 8 days ago
On a Classification Approach for SOA Vulnerabilities
Abstract--Vulnerabilities in operating systems and web applications have been and are being put into various classifications, leading to a better understanding of their causes and ...
Lutz Lowis, Rafael Accorsi
PAKM
2004
13 years 9 months ago
XAROP: A Midterm Report in Introducing a Decentralized Semantics-Based Knowledge Sharing Application
Abstract. Knowledge management solutions relying on central repositories sometimes have not met expectations, since users often create knowledge ad-hoc using their individual vocab...
Christoph Tempich, Marc Ehrig, Christiaan Fluit, P...
AGENTS
1998
Springer
14 years 17 days ago
Market-Based Resource Control for Mobile Agents
Mobile agents are programs that can migrate from machine to machine in a heterogeneous, partially disconnected network. As mobile agents move across a network, they consume resour...
Jonathan Bredin, David Kotz, Daniela Rus