Sciweavers

2257 search results - page 377 / 452
» Secure program partitioning
Sort
View
IADIS
2003
13 years 10 months ago
Com Technology for Remote Database Connectivity with Wireless PDAS
The potential software market for client-side mobile applications is strongly dependent upon the ability to rapidly migrate existing in-house software solutions, while maintaining...
David Olivieri, Juan Fco. Gálvez Gál...
WCCE
2001
105views Education» more  WCCE 2001»
13 years 10 months ago
Designing an IT College
: The University of the United Arab Emirates (UAEU) commissioned an international panel of experts to devise a model curriculum for their new College of Information Technology. The...
Peter J. Denning, Ravi Athale, Nada Dabbagh, Danie...
ENTCS
2008
79views more  ENTCS 2008»
13 years 9 months ago
j-POST: a Java Toolchain for Property-Oriented Software Testing
Abstract. j-POST is an integrated toolchain for property-oriented software testing. This toolchain includes a test designer, a test generator, and a test execution engine. The test...
Yliès Falcone, Laurent Mounier, Jean-Claude...
AUTOMATICA
2006
183views more  AUTOMATICA 2006»
13 years 9 months ago
Bank management via stochastic optimal control
This paper examines a problem related to the optimal risk management of banks in a stochastic dynamic setting. In particular, we minimize7 market and capital adequacy risk that in...
Janine Mukuddem-Petersen, Mark Adam Petersen
IJISEC
2008
119views more  IJISEC 2008»
13 years 9 months ago
Estimating the maximum information leakage
Preventing improper information leaks is a greatest challenge of the modern society. In this paper we present a technique for measuring the ability of several families of adversari...
Alessandro Aldini, Alessandra Di Pierro