Sciweavers

1770 search results - page 250 / 354
» Writing requirements in computer security
Sort
View
GCC
2003
Springer
14 years 3 months ago
Preserving Data Consistency in Grid Databases with Multiple Transactions
High performance Grid computing provides an infrastructure for access and processing of large volume, terabyte or even petabytes, of distributed data. Research in data grid has foc...
Sushant Goel, Hema Sharda, David Taniar
AINA
2010
IEEE
14 years 3 months ago
Lightweight Policy-Based Management of Quality-Assured, Device-Based Service Systems
Intelligent connected devices become a more vital part of our lives. In contrast to prior years, today embedded systems and devices are loosely coupled and cooperate with each oth...
Oliver Dohndorf, Jan Krüger, Heiko Krumm, Chr...
ISSRE
2002
IEEE
14 years 3 months ago
A Flexible Generator Architecture for Improving Software Dependability
Improving the dependability of computer systems is increasingly important as more and more of our lives depend on the availability of such systems. Wrapping dynamic link libraries...
Christof Fetzer, Zhen Xiao
ADHOCNETS
2009
Springer
14 years 2 months ago
Power-Aware Intrusion Detection in Mobile Ad Hoc Networks
Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion ...
Sevil Sen, John A. Clark, Juan E. Tapiador
EDOC
2000
IEEE
14 years 2 months ago
Pay As You Go-Associating Costs with Jini Leases
Jini is a technology for building reliable, fault-tolerant distributed applications. Besides offering an infrastructure for clients to locate services, it introduces the concept o...
Peer Hasselmeyer, Markus Schumacher, Marco Vo&szli...