Sciweavers

19003 search results - page 79 / 3801
» We Need Assurance!
Sort
View
DSS
2007
226views more  DSS 2007»
15 years 4 months ago
Dare to share: Protecting sensitive knowledge with data sanitization
chool of Business Research – FY 2007 Research Abstracts Dare to Share: Protecting Sensitive Knowledge with Data Sanitization Data sanitization is a process that is used to promot...
Ali Amiri
APNOMS
2006
Springer
15 years 8 months ago
GMPLS-Based VPN Service to Realize End-to-End QoS and Resilient Paths
We propose hierarchically distributed path computation elements (HDPCEs) that manage a multilayered GMPLS network and provide traffic engineering paths for end-to-end routes. We ap...
Hiroshi Matsuura, Kazumasa Takami
QOFIS
2000
Springer
15 years 8 months ago
Mechanisms for Inter-domain QoS Routing in Differentiated Service Networks
In order to provide various services with different quality requirements, the current Internet is expected to turn into a QoS based Internet under the Differentiated Service (DiffS...
Peng Zhang, Raimo Kantola
DASFAA
2009
IEEE
123views Database» more  DASFAA 2009»
15 years 11 months ago
A Reprocessing Model Based on Continuous Queries for Writing Data to RFID Tag Memory
This paper investigates the problem of writing data to passive RFID tag memory and proposes a reprocessing model for assuring the atomicity and durability of writing transactions i...
Wooseok Ryu, Bonghee Hong
ESEM
2009
ACM
15 years 11 months ago
Progress report on the experimental evaluation of security inspection guidance
Although security inspections have proven to be a very efficient means for assuring software security early in the software development lifecycle, they are not used extensively be...
Frank Elberzhager, Marek Jawurek, Christian Jung, ...