Sciweavers

340 search results - page 32 / 68
» With Gaming Technology towards Secure User Interfaces
Sort
View
NOMS
1998
IEEE
133views Communications» more  NOMS 1998»
14 years 2 days ago
ATM customer network management using WWW and CORBA technologies
In this paper, we present a framework for managing ATM customer networks using WWW and CORBA technologies. The WWW technology may provide network management operators with platfor...
Jong-Wook Baek, Tae-Joon Ha, Jong-Tae Park, James ...
MOZ
2004
Springer
14 years 1 months ago
The Structure of Authority: Why Security Is Not a Separable Concern
Common programming practice grants excess authority for the sake of functionality; programming principles require least authority for the sake of security. If we practice our princ...
Mark S. Miller, Bill Tulloh, Jonathan S. Shapiro
WICON
2008
13 years 9 months ago
Security vulnerabilities in IEEE 802.22
Cognitive Radio (CR) is seen as one of the enabling technologies for realizing a new spectrum access paradigm, viz. Opportunistic Spectrum Sharing (OSS). IEEE 802.22 is the world&...
Kaigui Bian, Jung Min Park
SIGCSE
2008
ACM
155views Education» more  SIGCSE 2008»
13 years 7 months ago
Towards a top-down approach to teaching an undergraduate grid computing course
Early undergraduate Grid computing courses generally took a bottom-up approach to Grid computing education starting with network protocols, client-server concepts, creating Web an...
Barry Wilkinson, Clayton Ferner
SEMWEB
2005
Springer
14 years 1 months ago
Towards Imaging Large-Scale Ontologies for Quick Understanding and Analysis
In many practical applications, ontologies tend to be very large and complicated. In order for users to quickly understand and analyze large-scale ontologies, in this paper we prop...
Kewei Tu, Miao Xiong, Lei Zhang, Haiping Zhu, Jie ...