Sciweavers

19003 search results - page 79 / 3801
» We Need Assurance!
Sort
View
DSS
2007
226views more  DSS 2007»
13 years 7 months ago
Dare to share: Protecting sensitive knowledge with data sanitization
chool of Business Research – FY 2007 Research Abstracts Dare to Share: Protecting Sensitive Knowledge with Data Sanitization Data sanitization is a process that is used to promot...
Ali Amiri
APNOMS
2006
Springer
13 years 11 months ago
GMPLS-Based VPN Service to Realize End-to-End QoS and Resilient Paths
We propose hierarchically distributed path computation elements (HDPCEs) that manage a multilayered GMPLS network and provide traffic engineering paths for end-to-end routes. We ap...
Hiroshi Matsuura, Kazumasa Takami
QOFIS
2000
Springer
13 years 11 months ago
Mechanisms for Inter-domain QoS Routing in Differentiated Service Networks
In order to provide various services with different quality requirements, the current Internet is expected to turn into a QoS based Internet under the Differentiated Service (DiffS...
Peng Zhang, Raimo Kantola
DASFAA
2009
IEEE
123views Database» more  DASFAA 2009»
14 years 2 months ago
A Reprocessing Model Based on Continuous Queries for Writing Data to RFID Tag Memory
This paper investigates the problem of writing data to passive RFID tag memory and proposes a reprocessing model for assuring the atomicity and durability of writing transactions i...
Wooseok Ryu, Bonghee Hong
ESEM
2009
ACM
14 years 2 months ago
Progress report on the experimental evaluation of security inspection guidance
Although security inspections have proven to be a very efficient means for assuring software security early in the software development lifecycle, they are not used extensively be...
Frank Elberzhager, Marek Jawurek, Christian Jung, ...