Sciweavers

6164 search results - page 1177 / 1233
» Teaching Computer Security
Sort
View
144
Voted
WICOMM
2008
258views more  WICOMM 2008»
15 years 2 months ago
Introducing reliability and load balancing in mobile IPv6-based networks
With the recent advances in portable devices and wireless networks, a new paradigm of computing has emerged which is known as mobile computing. In general mobile computing can be ...
Jahanzeb Faizan, Hesham El-Rewini, Mohamed Khalil
134
Voted
SAC
2010
ACM
15 years 14 days ago
A machine-checked soundness proof for an efficient verification condition generator
Verification conditions (VCs) are logical formulae whose validity implies the correctness of a program with respect to a specification. The technique of checking software properti...
Frédéric Vogels, Bart Jacobs 0002, F...
ANCS
2009
ACM
15 years 13 days ago
SPC-FA: synergic parallel compact finite automaton to accelerate multi-string matching with low memory
Deterministic Finite Automaton (DFA) is well-known for its constant matching speed in worst case, and widely used in multistring matching, which is a critical technique in high pe...
Junchen Jiang, Yi Tang, Bin Liu, Xiaofei Wang, Yan...
156
Voted
HIPC
2009
Springer
15 years 10 days ago
Highly scalable algorithm for distributed real-time text indexing
Stream computing research is moving from terascale to petascale levels. It aims to rapidly analyze data as it streams in from many sources and make decisions with high speed and a...
Ankur Narang, Vikas Agarwal, Monu Kedia, Vijay K. ...
159
Voted
ISF
2010
273views more  ISF 2010»
14 years 12 months ago
Agents of responsibility - freelance web developers in web applications development
Much of the literature on responsibility in the IT field addresses the responsibilities of members of the IT profession. In this paper, we investigate to what extent the responsibi...
Malik Aleem Ahmed, Jeroen van den Hoven
« Prev « First page 1177 / 1233 Last » Next »