Sciweavers

3796 search results - page 714 / 760
» Presentations by Programmers for Programmers
Sort
View
SECON
2007
IEEE
14 years 2 months ago
A Mechanism for Detecting and Responding to Misbehaving Nodes in Wireless Networks
Abstract—While mechanisms exist to instantiate common security functionality such as confidentiality and integrity, little has been done to define a mechanism for identificati...
Damon McCoy, Douglas C. Sicker, Dirk Grunwald
WISE
2007
Springer
14 years 2 months ago
Web Accessibility Evaluation Via XSLT
Web accessibility rules, i.e., the conditions to be met by Web sites in order to be considered accessible for all, can be (partially) checked automatically in many different ways....
Vicente Luque Centeno, Carlos Delgado Kloos, Jos&e...
AIMS
2007
Springer
14 years 2 months ago
Harnessing Models for Policy Conflict Analysis
Policy conflict analysis processes based solely on the examination of policy language constructs can not readily discern the semantics associated with the managed system for which ...
Steven Davy, Brendan Jennings
ECMDAFA
2007
Springer
122views Hardware» more  ECMDAFA 2007»
14 years 2 months ago
Model Transformation from OWL-S to BPEL Via SiTra
Although there are a large number of academic and industrial model transformation frameworks available, allowing specification, implementation, maintenance and documentation of mod...
Behzad Bordbar, Gareth Howells, Michael Evans, Ath...
ECOOP
2007
Springer
14 years 2 months ago
Aspect-Based Introspection and Change Analysis for Evolving Programs
— As new versions of software are developed bugs inevitably arise either due to regression or new functionality. Challenges arise in discovering, managing, and testing the impact...
Kevin J. Hoffman, Murali Krishna Ramanathan, Patri...