Sciweavers

446 search results - page 65 / 90
» Scientific Components Are Coming
Sort
View
ACSAC
2005
IEEE
14 years 1 months ago
Java for Mobile Devices: A Security Study
Java 2 Micro-Edition Connected Limited Device Configuration (J2ME CLDC) is the platform of choice when it comes to running mobile applications on resourceconstrained devices (cel...
Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, ...
ICAC
2005
IEEE
14 years 1 months ago
Myrrh: A Transaction-Based Model for Autonomic Recovery
As software comes under increasing scrutiny for its lack of safety and reliability, numerous static and partially dynamic tools (including model checking) have been proposed for v...
Guy Eddon, Steven P. Reiss
ICAS
2005
IEEE
143views Robotics» more  ICAS 2005»
14 years 1 months ago
Approaches to P2P Internet Application Development
Research in overlay and P2P networking has been tightly focused on fundamentals in the last few years, leading to developments on a range of important issues. The time has come to...
Thabotharan Kathiravelu, Arnold Pears
CANS
2005
Springer
86views Cryptology» more  CANS 2005»
14 years 1 months ago
On the Performance and Analysis of DNS Security Extensions
The Domain Name System (DNS) is an essential component of the critical infrastructure of the Internet. The role of DNS is vital, as it is involved in virtually every Internet tran...
Reza Curtmola, Aniello Del Sorbo, Giuseppe Atenies...
DOLAP
2004
ACM
14 years 1 months ago
Beyond data warehousing: what's next in business intelligence?
During the last ten years the approach to business management has deeply changed, and companies have understood the importance of enforcing achievement of the goals defined by the...
Matteo Golfarelli, Stefano Rizzi, Iuris Cella