Sciweavers

1770 search results - page 319 / 354
» Writing requirements in computer security
Sort
View
ISI
2004
Springer
14 years 1 months ago
A Tool for Internet Chatroom Surveillance
Internet chatrooms are common means of interaction and communications, and they carry valuable information about formal or ad-hoc formation of groups with diverse objectives. This ...
Seyit Ahmet Çamtepe, Mukkai S. Krishnamoort...
CODES
2003
IEEE
14 years 29 days ago
A codesigned on-chip logic minimizer
Boolean logic minimization is traditionally used in logic synthesis tools running on powerful desktop computers. However, logic minimization has recently been proposed for dynamic...
Roman L. Lysecky, Frank Vahid
RTCSA
2003
IEEE
14 years 28 days ago
Zero-Stop Authentication: Sensor-Based Real-Time Authentication System
Abstract. This paper proposes “Zero-stop Authentication” system, which requires no intentional interactions between users and authentication applications. Our Zero-stop Authent...
Kenta Matsumiya, Soko Aoki, Masana Murase, Hideyuk...
SBACPAD
2003
IEEE
103views Hardware» more  SBACPAD 2003»
14 years 28 days ago
Profiling and Optimization of Software-Based Network-Analysis Applications
A large set of tools for network monitoring and accounting, security, traffic analysis and prediction — more broadly, for network operation and management — require direct and...
Loris Degioanni, Mario Baldi, Fulvio Risso, Gianlu...
WMCSA
2003
IEEE
14 years 28 days ago
Web Services on Mobile Devices - Implementation and Experience
Web Services have started to appear on servers as interfaces between business-to-business applications. To date, mobile devices have only consumed Web Services running on stationa...
Stefan Berger, Scott McFaddin, Chandrasekhar Naray...