Sciweavers

2178 search results - page 124 / 436
» Toward Systemically Secure IT Architectures
Sort
View
CORR
2008
Springer
187views Education» more  CORR 2008»
13 years 9 months ago
Securing U-Healthcare Sensor Networks using Public Key Based Scheme
Recent emergence of electronic culture uplifts healthcare facilities to a new era with the aid of wireless sensor network (WSN) technology. Due to the sensitiveness of medical data...
Md. Mokammel Haque, Al-Sakib Khan Pathan, Choong S...
JHSN
2006
95views more  JHSN 2006»
13 years 9 months ago
IPsec/VPN security policy correctness and assurance
: With IPSec/VPN policies being widely deployed, how to correctly specify and configure them is critical in enforcing security requirements. Under current practice, IPSec/VPN polic...
Yanyan Yang, Charles U. Martel, Zhi (Judy) Fu, Shy...
WER
1998
Springer
14 years 1 months ago
Towards Requirements Engineering of Active Database Systems
Active systems are emerging in many fields, being particularly interesting those like Active Database Management Systems which always provide some kind of reactive capabilities. I...
José Hilario Canós Cerdá, Jav...
MSS
2000
IEEE
124views Hardware» more  MSS 2000»
14 years 1 months ago
Towards Mass Storage Systems with Object Granularity
Many applications, that need mass storage, manipulate data sets with KB – MB size objects. In contrast, mass storage devices work most efficiently for the storage and transfer ...
Koen Holtman, Peter van der Stok, Ian Willers
ETFA
2008
IEEE
14 years 3 months ago
Towards migrating legacy real-time systems to multi-core platforms
Power consumption and thermal problems limit the single-core processors to be faster. Processor architects are therefore moving toward multi-core processors. Developers of embedde...
Farhang Nemati, Johan Kraft, Thomas Nolte