Sciweavers

19003 search results - page 219 / 3801
» We Need Assurance!
Sort
View
CORR
2008
Springer
112views Education» more  CORR 2008»
13 years 11 months ago
SecMon: End-to-End Quality and Security Monitoring System
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and mergi...
Tomasz Ciszkowski, Charlott Eliasson, Markus Fiedl...
IEEESP
2007
98views more  IEEESP 2007»
13 years 10 months ago
Educating Students to Create Trustworthy Systems
igh level of abstraction and to provide broad oversight. In contrast, the goal of computer science security education is to provide the technicalexpertisetodevelopsecure software a...
Richard S. Swart, Robert F. Erbacher
TISSEC
2008
235views more  TISSEC 2008»
13 years 10 months ago
SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks
Hop-by-hop data aggregation is a very important technique for reducing the communication overhead and energy expenditure of sensor nodes during the process of data collection in a...
Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao
ICC
2009
IEEE
152views Communications» more  ICC 2009»
13 years 8 months ago
Scalable Video-On-Demand Streaming in Mobile Wireless Hybrid Networks
Video-on-demand service in wireless networks is one important step to achieving the goal of providing video services anywhere anytime. Typically, carrier mobile networks are used t...
Tai T. Do, Kien A. Hua, Alexander J. Aved, Fuyu Li...
MEDES
2010
ACM
13 years 5 months ago
Brazilian public software: beyond sharing
This work presents a case of an innovative Brazilian experience of use of free software in public administration as an emergent ecosystem, and the attempt to establish a quality f...
A. M. Alves, Marcelo Schneck de Paula Pessôa