Sciweavers

954 search results - page 155 / 191
» On Controlled Flexibility
Sort
View
ICDE
2007
IEEE
149views Database» more  ICDE 2007»
14 years 1 months ago
Private Relationships in Social Networks
Current social networks implement very simple protection mechanisms, according to which a user can state whether his/her personal data, relationships, and resources should be eith...
Barbara Carminati, Elena Ferrari, Andrea Perego
ATAL
2006
Springer
14 years 1 months ago
Exploring sensor networks using mobile agents
Today's wireless sensor networks have limited flexibility because their software is static. Mobile agents alleviate this problem by introducing mobile code and state. Mobile ...
Daniel Massaguer, Chien-Liang Fok, Nalini Venkatas...
DFT
2004
IEEE
90views VLSI» more  DFT 2004»
14 years 1 months ago
An XOR Based Reed-Solomon Algorithm for Advanced RAID Systems
In this paper, a simple codec algorithm based on Reed-Solomon (RS) codes is proposed for erasure correcting in RAID (Redundant Array of Independent Disks) level 6 systems. Unlike ...
Ping-Hsun Hsieh, Ing-Yi Chen, Yu-Ting Lin, Sy-Yen ...
ESORICS
2000
Springer
14 years 1 months ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
ICSE
2000
IEEE-ACM
14 years 1 months ago
A case study: demands on component-based development
Building software systems with reusable components brings many advantages. The development becomes more efficient, the reliability of the products is enhanced, and the maintenance...
Ivica Crnkovic, Magnus Larsson