Sciweavers

1015 search results - page 87 / 203
» New Area Management Method Based on
Sort
View
HASE
2007
IEEE
14 years 5 days ago
Precise Documentation of Critical Software
This experience and research based paper discusses the reasons that software cannot be trusted and then explains how the use of greatly improved documentation can make software mo...
David Lorge Parnas, Sergiy A. Vilkomir
BIRTHDAY
2005
Springer
14 years 1 months ago
Towards MultiMedia Instruction in Safe and Secure Systems
Abstract. The aim of the MMiSS project is the construction of a multimedia Internet-based adaptive educational system. Its content will initially cover a whole curriculum in the ar...
Bernd Krieg-Brückner
PAKDD
2007
ACM
115views Data Mining» more  PAKDD 2007»
14 years 2 months ago
Intelligent Sequential Mining Via Alignment: Optimization Techniques for Very Large DB
The shear volume of the results in traditional support based frequent sequential pattern mining methods has led to increasing interest in new intelligent mining methods to find mo...
Hye-Chung Kum, Joong Hyuk Chang, Wei Wang 0010
GLOBECOM
2009
IEEE
14 years 4 days ago
Tame Pool-Based Pairwise Key Predistribution for Large-Scale Sensor Networks
Many existing pairwise key establishment in sensor networks were developed based on the polynomial-based method. However, this method cannot offer the basic authentication function...
Yen-Hua Liao, Chin-Laung Lei, Ai-Nung Wang, Wen-Ch...
FOSAD
2000
Springer
13 years 12 months ago
Security Goals: Packet Trajectories and Strand Spaces
This material was presented in a series of lectures at fosad, a summer school on Foundations of Security Analysis and Design, at the University of Bologna Center at Bertinoro in Se...
Joshua D. Guttman