Sciweavers

2310 search results - page 340 / 462
» Managing System and Active-Content Integrity
Sort
View
CG
2007
Springer
13 years 8 months ago
Visual data mining and analysis of software repositories
In this article we describe an ongoing effort to integrate information visualization techniques into the process of configuration management for software systems. Our focus is to...
Lucian Voinea, Alexandru Telea
IJNSEC
2006
200views more  IJNSEC 2006»
13 years 8 months ago
3G and WLAN Interworking Security: Current Status and Key
The third-generation (3G) mobile communication systems provide great coverage, complete subscriber management and nearly universal roaming. Nevertheless, 3G systems are subject to...
Chou Chen Yang, Kuan-Hao Chu, Ya-Wen Yang
MDBIS
2004
149views Database» more  MDBIS 2004»
13 years 9 months ago
Enhanced User Support for Mobile Ad-hoc-Processes
: In ubiquitous application scenarios, the information (processing) needs of nomadic users often cannot be satisfied by a set of pre-installed processes like in common workflow sys...
Klaus Haller, Michelle Ackermann, Claudio Munari, ...

Tutorial
905views
15 years 8 months ago
Location-aware Query Processing and Optimization
The wide spread use of cellular phones, handheld devices, and GPS-like technology enables location-aware environments where virtually all objects are aware of their locations. Loca...

Lecture Notes
773views
15 years 6 months ago
Computer Networking and Internet Protocols: A Comprehensive Introduction
The lecture notes cover the following topics, Fundamentals (OSI Reference Model, Coding, Ethernet), Data Link Control (Flow Control, Error Control, HDLC, PPP), Internet Protocol ...
Raj Jain