Sciweavers

807 search results - page 25 / 162
» Deploying and evaluating a location-aware system
Sort
View
CCS
2008
ACM
13 years 11 months ago
Asynchronous policy evaluation and enforcement
Evaluating and enforcing policies in large-scale networks is one of the most challenging and significant problems facing the network security community today. Current solutions ar...
Matthew Burnside, Angelos D. Keromytis
WMCSA
2003
IEEE
14 years 3 months ago
Design and Evaluation of a Metropolitan Area Multitier Wireless Ad Hoc Network Architecture
Few real-world applications of mobile ad hoc networks have been developed or deployed outside the military environment, and no traces of actual node movement in a real ad hoc netw...
Jorjeta G. Jetcheva, Yih-Chun Hu, Santashil PalCha...
EUROMICRO
2004
IEEE
14 years 1 months ago
Evaluation of Component Technologies with Respect to Industrial Requirements
We compare existing component technologies for embedded systems with respect to industrial requirements. The requirements are collected from the vehicular industry, but our findin...
Anders Möller, Mikael Åkerholm, Johan F...
TSE
2008
89views more  TSE 2008»
13 years 9 months ago
WASP: Protecting Web Applications Using Positive Tainting and Syntax-Aware Evaluation
Many software systems have evolved to include a Web-based component that makes them available to the public via the Internet and can expose them to a variety of Web-based attacks. ...
William G. J. Halfond, Alessandro Orso, Pete Manol...
ASSETS
2007
ACM
14 years 1 months ago
Using participatory activities with seniors to critique, build, and evaluate mobile phones
Mobile phones can provide a number of benefits to older people. However, most mobile phone designs and form factors are targeted at younger people and middle-aged adults. To infor...
Michael Massimi, Ronald M. Baecker, Michael Wu