Sciweavers

2337 search results - page 365 / 468
» Threat-Driven Architectural Design of Secure Information Sys...
Sort
View
OIR
2007
123views more  OIR 2007»
13 years 8 months ago
The IP's guide to the galaxy of portal planning: part III - administrative framework
Purpose – This article is the third in a four-part series that aims to illustrate the process involved in planning a portal and creating a portal definition document. Design/me...
Amy M. Finley, Rebecca H. Augustyniak
MOBIHOC
2009
ACM
14 years 9 months ago
Fine-grained boundary recognition in wireless ad hoc and sensor networks by topological methods
Location-free boundary recognition is crucial and critical for many fundamental network functionalities in wireless ad hoc and sensor networks. Previous designs, often coarse-grai...
Dezun Dong, Yunhao Liu, Xiangke Liao
OOPSLA
2004
Springer
14 years 2 months ago
C-SAW and genAWeave: a two-level aspect weaving toolsuite
This demonstration will feature overviews of the C-SAW and GenAWeave projects. The first half of the presentation will introduce the concept of two-level aspect weaving, which uni...
Jeffrey G. Gray, Jing Zhang, Suman Roychoudhury, I...
OOPSLA
2009
Springer
14 years 3 months ago
A concurrent dynamic analysis framework for multicore hardware
Software has spent the bounty of Moore’s law by solving harder problems and exploiting abstractions, such as highlevel languages, virtual machine technology, binary rewritdynami...
Jungwoo Ha, Matthew Arnold, Stephen M. Blackburn, ...
SIGCOMM
2005
ACM
14 years 2 months ago
Declarative routing: extensible routing with declarative queries
The Internet’s core routing infrastructure, while arguably robust and efficient, has proven to be difficult to evolve to accommodate the needs of new applications. Prior researc...
Boon Thau Loo, Joseph M. Hellerstein, Ion Stoica, ...