Sciweavers

264 search results - page 37 / 53
» Source-Based Trace Exploration
Sort
View
IEEEIAS
2009
IEEE
14 years 4 months ago
Threats Identification in Healthcare Information Systems Using Genetic Algorithm and Cox Regression
: Threats to information security for healthcare information system increased tremendously. There are various factors that contribute to information security threats, many research...
Rabiah Ahmad, Ganthan Narayana Samy, Nuzulha Khilw...
NORDSEC
2009
Springer
14 years 4 months ago
Towards Practical Enforcement Theories
Runtime enforcement is a common mechanism for ensuring that program executions adhere to constraints specified by a security policy. It is based on two simple ideas: the enforceme...
Nataliia Bielova, Fabio Massacci, Andrea Michelett...
SIGCOMM
2009
ACM
14 years 4 months ago
Energy-aware performance optimization for next-generation green network equipment
Besides a more widespread sensitivity to ecological issues, the interest in energy-efficient network technologies springs from heavy and critical economical needs, since both ener...
Raffaele Bolla, Roberto Bruschi, Franco Davoli, An...
SIGCOMM
2009
ACM
14 years 4 months ago
Opportunistic forwarding in workplaces
So far, the search for Opportunistic Network (ON) applications has focused on urban/rural scenarios where the combined use of mobility and the store-carry-and-forward paradigm hel...
Sabrina Gaito, Elena Pagani, Gian Paolo Rossi
ICDCS
2008
IEEE
14 years 4 months ago
Mobile Filtering for Error-Bounded Data Collection in Sensor Networks
In wireless sensor networks, filters, which suppress data update reports within predefined error bounds, effectively reduce the traffic volume for continuous data collection. A...
Dan Wang, Jianliang Xu, Jiangchuan Liu, Feng Wang