Sciweavers

12551 search results - page 2296 / 2511
» Reuse in Systems Engineering
Sort
View
IH
2004
Springer
15 years 9 months ago
An Asymmetric Security Mechanism for Navigation Signals
Abstract. Existing navigation services, such as GPS, offer no signalintegrity (anti-spoof) protection for the general public, especially not with systems for remote attestation of...
Markus G. Kuhn
ITRUST
2004
Springer
15 years 9 months ago
Towards Dynamic Security Perimeters for Virtual Collaborative Networks
Abstract The Internet provides a ubiquitous, standards-based substrate for global communications of all kinds. Rapid advances are now being made in agreeing protocols and machine-p...
Ivan Djordjevic, Theodosis Dimitrakos
LCTRTS
2004
Springer
15 years 9 months ago
Link-time optimization of ARM binaries
The overhead in terms of code size, power consumption and execution time caused by the use of precompiled libraries and separate compilation is often unacceptable in the embedded ...
Bruno De Bus, Bjorn De Sutter, Ludo Van Put, Domin...
MIDDLEWARE
2004
Springer
15 years 9 months ago
Application partitioning and hierarchical management in grid environments
Several works on grid computing have been proposed in the last years. However, most of them, including available software, can not deal properly with some issues related to contro...
Patrícia Kayser Vargas, Inês de Castr...
POLICY
2004
Springer
15 years 9 months ago
Security Policy Reconciliation in Distributed Computing Environments
A major hurdle in sharing resources between organizations is heterogeneity. Therefore, in order for two organizations to collaborate their policies have to be resolved. The proces...
Hao Wang, Somesh Jha, Miron Livny, Patrick Drew Mc...
« Prev « First page 2296 / 2511 Last » Next »