Sciweavers

1352 search results - page 228 / 271
» Designing Security Requirements Models Through Planning
Sort
View
ECIS
2003
13 years 10 months ago
Transacting with citizens: Australian government policy strategy and implementation of online tax lodgement
Many governments have shown leadership in encouraging their citizenry to conduct transactions on-line. The policies that underpin these initiatives refer to a blend of civic benef...
Jeff Chamberlain, Tanya Castleman
AAAI
1994
13 years 10 months ago
Exploiting Meta-Level information in a Distributed Scheduling System
In this paper, we study the problem of achieving efficient interaction in a distributed scheduling system whose scheduling agents may borrow resources from one another. Specifical...
Daniel E. Neiman, David W. Hildum, Victor R. Lesse...
NETWORK
2007
234views more  NETWORK 2007»
13 years 8 months ago
Surveillance Wireless Sensor Networks: Deployment Quality Analysis
Surveillance wireless sensor networks are deployed at perimeter or border locations to detect unauthorized intrusions. For deterministic deployment of sensors, the quality of depl...
Ertan Onur, Cem Ersoy, Hakan Deliç, Lale Ak...
MICRO
2009
IEEE
168views Hardware» more  MICRO 2009»
14 years 3 months ago
Ordering decoupled metadata accesses in multiprocessors
Hardware support for dynamic analysis can minimize the performance overhead of useful applications such as security checks, debugging, and profiling. To eliminate implementation ...
Hari Kannan
SACMAT
2006
ACM
14 years 2 months ago
PRIMA: policy-reduced integrity measurement architecture
We propose an integrity measurement approach based on information flow integrity, which we call the Policy-Reduced Integrity Measurement Architecture (PRIMA). The recent availabi...
Trent Jaeger, Reiner Sailer, Umesh Shankar