Sciweavers

1177 search results - page 189 / 236
» Integrating Security Administration into Software Architectu...
Sort
View
WS
2004
ACM
14 years 2 months ago
A man-in-the-middle attack on UMTS
In this paper we present a man-in-the-middle attack on the Universal Mobile Telecommunication Standard (UMTS), one of the newly emerging 3G mobile technologies. The attack allows ...
Ulrike Meyer, Susanne Wetzel
ICALT
2006
IEEE
14 years 2 months ago
Implementation of a Personalized Assessment Web Service
This paper describes the design, development and qualitative evaluation of a web-based personalized assessment service of an object–oriented programming course at the University...
Lilia Cheniti-Belcadhi, Nicola Henze, Rafik Braham
COOPIS
1996
IEEE
14 years 28 days ago
A Methodology for Building a Data Warehouse in a Scientific Environment
Rational drug design is an example where integrated access to heterogeneous scientific data is urgently needed, as it becomes rapidly available due to new experimental and computa...
Karl Aberer, Klemens Hemm
ERCIM
2008
94views more  ERCIM 2008»
13 years 8 months ago
Model-Based Development of Distributed Embedded Real-Time Systems
The increasing complexity of distributed embedded systems, as found today in airplanes or cars, becomes more and more a critical cost-factor for their development. Model-based app...
Wolfgang Herzner, Martin Schlager, György Cse...
JTAER
2010
121views more  JTAER 2010»
13 years 7 months ago
A Semantic Data Validation Service for Web Applications
An Input validation can be a critical issue. Typically, a little attention is paid to it in a web development project, because overenthusiastic validation can tend to cause failur...
Shadi Aljawarneh, Faisal Alkhateeb, Eslam Al Magha...