Sciweavers

1352 search results - page 217 / 271
» Designing Security Requirements Models Through Planning
Sort
View
MINENET
2006
ACM
14 years 2 months ago
SC2D: an alternative to trace anonymization
Progress in networking research depends crucially on applying novel analysis tools to real-world traces of network activity. This often conflicts with privacy and security requir...
Jeffrey C. Mogul, Martin F. Arlitt
MSWIM
2005
ACM
14 years 2 months ago
Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks
Recently, user mobility in wireless data networks is increasing because of the popularity of portable devices and the desire for voice and multimedia applications. These applicati...
Mohamed Kassab, Abdelfattah Belghith, Jean-Marie B...
DAC
1999
ACM
14 years 1 months ago
Distributed Application Development with Inferno
Distributed computing has taken a new importance in order to meet the requirements of users demanding information “anytime, anywhere.” Inferno facilitates the creation and sup...
Ravi Sharma
ISCAS
1999
IEEE
110views Hardware» more  ISCAS 1999»
14 years 1 months ago
Receiver-based congestion control mechanism for Internet video transmission
Efficient transmission of delay-stringent video over the Internet is examined in this work. In our design, an end user adjusts the network load depending on the perceived network ...
Yon Jun Chung, Young-Gook Kim, JongWon Kim, C. C. ...
ECAI
2006
Springer
14 years 15 days ago
Bridging the Gap Between Informal and Formal Guideline Representations
Abstract. Clinical guidelines are important means to improve quality of health care while limiting cost and supporting the medical staff. They are written as free text with tables ...
Andreas Seyfang, Silvia Miksch, Mar Marcos, Joland...