Sciweavers

1770 search results - page 48 / 354
» Writing requirements in computer security
Sort
View
ICDCSW
2006
IEEE
14 years 1 months ago
Wearable Computer for Ubiquitous Informal Communication
The rapid progress of information technology has spurred development of various communication support systems. In particular, the importance of informal communication has lately d...
Shun'ichi Tano, Tatsuhiro Takayama, Mitsuru Iwata,...
AEI
2010
115views more  AEI 2010»
13 years 7 months ago
BRAHMS: Novel middleware for integrated systems computation
Abstract-- Computational modellers are becoming increasingly interested in building large, eclectic, biological models. These may integrate nervous system components at various lev...
Benjamin Mitchinson, Tak-Shing Chan, Jonathan M. C...
ENTCS
2007
126views more  ENTCS 2007»
13 years 7 months ago
Context Dependent Procedures and Computed Types in -eriFun
We present two enhancements of the functional language L which is used in the eriFun system to write programs and formulate statements about them. Context dependent procedures all...
Andreas Schlosser, Christoph Walther, Michael Gond...
HPCA
2002
IEEE
14 years 20 days ago
User-Level Communication in Cluster-Based Servers
Clusters of commodity computers are currently being used to provide the scalability required by severalpopular Internet services. In this paper we evaluate an efficient cluster-b...
Enrique V. Carrera, Srinath Rao, Liviu Iftode, Ric...
ISF
2008
114views more  ISF 2008»
13 years 7 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan