Sciweavers

1471 search results - page 266 / 295
» Derivation of Backup Service Management Applications from Se...
Sort
View
ECMDAFA
2008
Springer
118views Hardware» more  ECMDAFA 2008»
13 years 8 months ago
A Metamodeling Approach for Reasoning about Requirements
In requirements engineering, there are several approaches for requirements modeling such as goal-oriented, aspect-driven, and system requirements modeling. In practice, companies o...
Arda Goknil, Ivan Kurtev, Klaas van den Berg
DEXAW
2007
IEEE
199views Database» more  DEXAW 2007»
13 years 11 months ago
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulat...
Esther Palomar, Juan M. Estévez-Tapiador, J...
BIOSIG
2008
170views Biometrics» more  BIOSIG 2008»
13 years 9 months ago
Frontex Perspectives on Biometrics for Border Checks
: The European Union is developing new concepts for border management. Biometrics is seen is a key technology to facilitate more secure and convenient border management. Biometric ...
Erik Berglund, Rasa Karbauskaite
TMM
2002
139views more  TMM 2002»
13 years 7 months ago
Robust progressive image transmission over OFDM systems using space-time block code
A joint source-channel coding (JSCC) scheme for robust progressive image transmission over broadband wireless channels using orthogonal frequency division multiplexing (OFDM) syste...
Jie Song, K. J. Ray Liu
WWW
2007
ACM
14 years 8 months ago
Subspace: secure cross-domain communication for web mashups
Combining data and code from third-party sources has enabled a new wave of web mashups that add creativity and functionality to web applications. However, browsers are poorly desi...
Collin Jackson, Helen J. Wang