Sciweavers

1770 search results - page 224 / 354
» Writing requirements in computer security
Sort
View
ACMICEC
2008
ACM
195views ECommerce» more  ACMICEC 2008»
14 years 12 days ago
DRM domain authentication using electronic payment systems
This paper focuses on the problem of how to allow sharing of copyrighted content between a set of authorised devices and preventing unauthoried copying of content to other devices...
Imad M. Abbadi, Muntaha Alawneh
EMSOFT
2007
Springer
14 years 4 months ago
Loosely time-triggered architectures based on communication-by-sampling
We address the problem of mapping a set of processes which communicate synchronously on a distributed platform. The Time Triggered Architecture (TTA) proposed by Kopetz for the co...
Albert Benveniste, Paul Caspi, Marco Di Natale, Cl...
AI
2000
Springer
13 years 10 months ago
Wrapper induction: Efficiency and expressiveness
The Internet presents numerous sources of useful information--telephone directories, product catalogs, stock quotes, event listings, etc. Recently, many systems have been built th...
Nicholas Kushmerick
SSDBM
2011
IEEE
257views Database» more  SSDBM 2011»
13 years 2 months ago
Database-as-a-Service for Long-Tail Science
Database technology remains underused in science, especially in the long tail  the small labs and individual researchers that collectively produce the majority of scientic output...
Bill Howe, Garrett Cole, Emad Souroush, Paraschos ...
WS
2005
ACM
14 years 3 months ago
Fully self-organized peer-to-peer key management for mobile ad hoc networks
Mobile ad hoc networks (MANETs) offer communication over a shared wireless channel without any pre-existing infrastructure. Forming peer-to-peer security associations in MANETs i...
Johann van der Merwe, Dawoud S. Dawoud, Stephen Mc...