Sciweavers

1352 search results - page 144 / 271
» Designing Security Requirements Models Through Planning
Sort
View
ICALT
2005
IEEE
14 years 3 months ago
Learning Units Design Based in Grid Computing
: The development of cooperative, flexible and reusable learning environments is a need in modern education. The IMS Learning Design specification has played a very important role ...
Leonel Iriarte Navarro, Manuel Marco Such, Alexand...
CTRSA
2009
Springer
155views Cryptology» more  CTRSA 2009»
14 years 4 months ago
Cryptanalysis of CTC2
CTC is a toy cipher designed in order to assess the strength of algebraic attacks. While the structure of CTC is deliberately weak with respect to algebraic attacks, it was claimed...
Orr Dunkelman, Nathan Keller
OOPSLA
2009
Springer
14 years 4 months ago
Thorn: robust, concurrent, extensible scripting on the JVM
Scripting languages enjoy great popularity due their support for rapid and exploratory development. They typically have lightweight syntax, weak data privacy, dynamic typing, powe...
Bard Bloom, John Field, Nathaniel Nystrom, Johan &...
WOWMOM
2005
ACM
201views Multimedia» more  WOWMOM 2005»
14 years 3 months ago
Real-Time Intrusion Detection for Ad Hoc Networks
A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. The widely accepted existing routing protocols de...
Ioanna Stamouli, Patroklos G. Argyroudis, Hitesh T...
IJIT
2004
13 years 11 months ago
Design of Gain Scheduled Fuzzy PID Controller
An adaptive fuzzy PID controller with gain scheduling is proposed in this paper. The structure of the proposed gain scheduled fuzzy PID (GS_FPID) controller consists of both fuzzy ...
Leehter Yao, Chin-chin Lin