Sciweavers

3003 search results - page 520 / 601
» Software Security: Building Security In
Sort
View
SIGCSE
2008
ACM
365views Education» more  SIGCSE 2008»
13 years 8 months ago
Computer science olympiad: exploring computer science through competition
Generating interest in specialized areas of Computer Science (CS) is one of the goals of the department of Computer and Information Science at Spelman College as with most departm...
Iretta B. C. Kearse, Charles Hardnett
JSAC
2007
95views more  JSAC 2007»
13 years 8 months ago
Experiences in implementing an experimental wide-area GMPLS network
In this article, we describe our experiences in implementing an experimental wide-area GMPLS network called CHEETAH (Circuit-Switched End-to-End Transport Architecture). The key c...
Xiangfei Zhu, Xuan Zheng, Malathi Veeraraghavan
PE
2007
Springer
154views Optimization» more  PE 2007»
13 years 8 months ago
QoS management in service-oriented architectures
The next generation of software systems will be highly distributed, component-based and service-oriented. They will need to operate in unattended mode and possibly in hostile envi...
Daniel A. Menascé, Honglei Ruan, Hassan Gom...
JSS
2010
123views more  JSS 2010»
13 years 7 months ago
Timed Property Sequence Chart
—Probabilistic properties are considered as the most important requirements for a variety of software systems, since they are used to formulate extra-functional requirements such...
Pengcheng Zhang, Bixin Li, Lars Grunske
TIFS
2010
128views more  TIFS 2010»
13 years 7 months ago
Steganalysis by subtractive pixel adjacency matrix
This paper presents a novel method for detection of steganographic methods that embed in the spatial domain by adding a low-amplitude independent stego signal, an example of which...
Tomás Pevný, Patrick Bas, Jessica J....