Sciweavers

1544 search results - page 175 / 309
» The Process of Adoption
Sort
View
133
Voted
INFOCOM
1998
IEEE
15 years 8 months ago
A Priority Scheme for the IEEE 802.14 MAC Protocol for Hybrid Fiber-Coax Networks
In order to support quality-of-service (QoS) for real-time data communications such as voice, video and interactive services, multiaccess networks must provide an effective priorit...
Mark D. Corner, Nada Golmie, Jörg Liebeherr, ...
FORTE
2008
15 years 5 months ago
Detecting Communication Protocol Security Flaws by Formal Fuzz Testing and Machine Learning
Network-based fuzz testing has become an effective mechanism to ensure the security and reliability of communication protocol systems. However, fuzz testing is still conducted in a...
Guoqiang Shu, Yating Hsu, David Lee
145
Voted
IJIEM
2010
171views more  IJIEM 2010»
15 years 2 months ago
eConsent: provenance, use and future role
The use of information technology to manage patient consent is an important emerging area of research in health data management. This paper identifies literature, technological ad...
Sophie Cockcroft
SACMAT
2006
ACM
15 years 9 months ago
Traust: a trust negotiation-based authorization service for open systems
In recent years, trust negotiation (TN) has been proposed as a novel access control solution for use in open system environments in which resources are shared across organizationa...
Adam J. Lee, Marianne Winslett, Jim Basney, Von We...
124
Voted
TSE
2002
105views more  TSE 2002»
15 years 3 months ago
Disaggregating and Calibrating the CASE Tool Variable in COCOMO II
CASE (Computer Aided Software Engineering) tools are believed to have played a critical role in improving software productivity and quality by assisting tasks in software developme...
Jongmoon Baik, Barry W. Boehm, Bert Steece