Sciweavers

148 search results - page 29 / 30
» Very low-cost internet access using KioskNet
Sort
View
ICSE
2000
IEEE-ACM
13 years 11 months ago
Software engineering for security: a roadmap
Is there such a thing anymore as a software system that doesn't need to be secure? Almost every softwarecontrolled system faces threats from potential adversaries, from Inter...
Premkumar T. Devanbu, Stuart G. Stubblebine
BELL
2002
86views more  BELL 2002»
13 years 7 months ago
Middleboxes: Controllable media firewalls
Internet technology is promised to provide the broadband multi-service future. Today this technology can not provide basic quality guarantees for the services rendered. Generally ...
Paul Sijben, Willem van Willigenburg, Michel de Bo...
VLDB
1999
ACM
147views Database» more  VLDB 1999»
13 years 11 months ago
Data-Driven, One-To-One Web Site Generation for Data-Intensive Applications
A data-driven approach can be fruitfully used in the speci cation and automatic generation of data-intensive Web applications, i.e., applications which make large amounts of data ...
Stefano Ceri, Piero Fraternali, Stefano Paraboschi
CSREASAM
2003
13 years 8 months ago
Randomized Traitor Tracing Algorithms for Broadcast Security
We introduce and analyze a randomized traitor tracing algorithm for broadcast security. This algorithm is very efficient compared to brute force methods (the mean time it takes is...
Simon McNicol, Serdar Boztas
COMCOM
2008
147views more  COMCOM 2008»
13 years 7 months ago
Vehicular Ad Hoc Networks: A New Challenge for Localization-Based Systems
A new kind of ad hoc network is hitting the streets: Vehicular Ad Hoc Networks (VANets). In these networks, vehicles communicate with each other and possibly with a roadside infra...
Azzedine Boukerche, Horacio A. B. F. de Oliveira, ...