Sciweavers

1352 search results - page 134 / 271
» Designing Security Requirements Models Through Planning
Sort
View
INFOCOM
2005
IEEE
14 years 3 months ago
Distributed algorithms for secure multipath routing
— To proactively defend against intruders from readily jeopardizing single-path data sessions, we propose a distributed secure multipath solution to route data across multiple pa...
Patrick P. C. Lee, Vishal Misra, Dan Rubenstein
DBPL
1989
Springer
165views Database» more  DBPL 1989»
14 years 2 months ago
Support for Data-Intensive Applications: Conceptual Design and Software Development
In the process of developing an Information System, one passes through stages that include requirements gathering, design specification, and software implementation. The purpose ...
Alexander Borgida, John Mylopoulos, Joachim W. Sch...
EDBT
2008
ACM
147views Database» more  EDBT 2008»
14 years 10 months ago
iDataGuard: middleware providing a secure network drive interface to untrusted internet data storage
In this demonstration, we present the design and features of iDataGuard. iDataGuard is an interoperable security middleware that allows users to outsource their file systems to he...
Ravi Chandra Jammalamadaka, Roberto Gamboni, Shara...
JIPS
2010
138views more  JIPS 2010»
13 years 5 months ago
A Study on Design and Implementation of the Ubiquitous Computing Environment-based Dynamic Smart On/Off-line Learner Tracking Sy
In order to provide a tailored education for learners within the ubiquitous environment, it is critical to undertake an analysis of the learning activities of learners. For this pu...
Hyung-Min Lim, Kun-Won Jang, Byung-Gi Kim
WSCG
2003
193views more  WSCG 2003»
13 years 11 months ago
Automatically Generating Roof Models from Building Footprints
Modelling Large Urban Environments using traditional modelling techniques would prove too time consuming a process. Consequently a method is required for generating large urban en...
R. G. Laycock, A. M. Day