Sciweavers

1770 search results - page 307 / 354
» Writing requirements in computer security
Sort
View
GCC
2006
Springer
13 years 11 months ago
On Interoperability: The Execution Management Perspective Based on ChinaGrid Support Platform*
Interoperability between different Grid implementations is attracting more and more attention to seamlessly job execution. In this paper, one approach is proposed to implement the...
Yongwei Wu, Likun Liu, Weimin Zheng, Feng He
CHES
2008
Springer
84views Cryptology» more  CHES 2008»
13 years 9 months ago
A Real-World Attack Breaking A5/1 within Hours
Abstract. In this paper we present a real-world hardware-assisted attack on the wellknown A5/1 stream cipher which is (still) used to secure GSM communication in most countries all...
Timo Gendrullis, Martin Novotný, Andy Rupp
COLCOM
2008
IEEE
13 years 9 months ago
Mashup Model and Verification Using Mashup Processing Network
Abstract. Mashups are defined to be lightweight Web applications aggregating data from different Web services, built using ad-hoc composition and being not concerned with long term...
Ehtesham Zahoor, Olivier Perrin, Claude Godart
CONEXT
2008
ACM
13 years 9 months ago
Towards systematic design of enterprise networks
Enterprise networks are important, with size and complexity even surpassing carrier networks. Yet, the design of enterprise networks remains ad-hoc and poorly understood. In this p...
Yu-Wei Eric Sung, Sanjay G. Rao, Geoffrey G. Xie, ...
AAAI
2004
13 years 9 months ago
Visibility-Based Pursuit-Evasion with Limited Field of View
We study a form of the pursuit-evasion problem, in which one or more searchers must move through a given environment so as to guarantee detection of any and all evaders, which can...
Brian P. Gerkey, Sebastian Thrun, Geoffrey J. Gord...