Sciweavers

26071 search results - page 5115 / 5215
» Making the
Sort
View
JCST
2010
198views more  JCST 2010»
13 years 4 months ago
Certification of Thread Context Switching
With recent efforts to build foundational certified software systems, two different approaches have been proposed to certify thread context switching. One is to certify both thread...
Yu Guo, Xinyu Jiang, Yiyun Chen
JDCTA
2010
187views more  JDCTA 2010»
13 years 4 months ago
Automatic Verification of Security Properties in Remote Internet Voting Protocol with Applied Pi Calculus
Soundness and coercion resistance are the important and intricate security requirements for remote voting protocols. Several formal models of soundness and coercion-resistance hav...
Bo Meng, Wei Huang, Zimao Li, Dejun Wang
JIPS
2010
159views more  JIPS 2010»
13 years 4 months ago
A Dynamic Approach to Estimate Change Impact using Type of Change Propagation
Software evolution is an ongoing process carried out with the aim of extending base applications either for adding new functionalities or for adapting software to changing environm...
Chetna Gupta, Yogesh Singh, Durg Singh Chauhan
JIPS
2010
389views more  JIPS 2010»
13 years 4 months ago
The Wormhole Routing Attack in Wireless Sensor Networks (WSN)
Secure routing is vital to the acceptance and use of Wireless Sensor Networks (WSN) for many applications. However, providing secure routing in WSNs is a challenging task due to th...
Lukman Sharif, Munir Ahmed
JIPS
2010
195views more  JIPS 2010»
13 years 4 months ago
Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques
Abstract--The Internet explosion and the increase in crucial web applications such as ebanking and e-commerce, make essential the need for network security tools. One of such tools...
Aly M. El-Semary, Mostafa Gadal-Haqq M. Mostafa
« Prev « First page 5115 / 5215 Last » Next »