Sciweavers

IEEECIT
2010
IEEE
13 years 5 months ago
Reform and Practice in the Course ???The Principle of Computer Organization???
—This paper introduces several new guiding ideologies in “the Principle of Computer Organization” course reform, based on the purpose of application-oriented personnel traini...
Qifan Yang, Jianping Cai
IEEECIT
2010
IEEE
13 years 5 months ago
Discussion on the Teaching Reform of Single-chip Computer Base on Mode CDIO at Vocational College
—The conventional teaching model is broken in Mode CDIO, in which, with the carrier of project, the educational idea based on project-learning and the principle of teaching integ...
Baiqing Zhou, Xiuhui Kui, Youtian Qu
IEEECIT
2010
IEEE
13 years 5 months ago
Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds
—Phishing is the practice of eliciting a person’s confidential information such as the name, date of birth or credit card details. Typically, the phishers combine some technol...
Federico Maggi
IEEECIT
2010
IEEE
13 years 5 months ago
A Recognizer of Rational Trace Languages
—The relevance of instruction parallelization and optimal event scheduling is currently increasing. In particular, because of the high amount of computational power available tod...
Federico Maggi
IEEECIT
2010
IEEE
13 years 5 months ago
Predictive and Dynamic Resource Allocation for Enterprise Applications
—Dynamic resource allocation has the potential to provide significant increases in total revenue in enterprise systems through the reallocation of available resources as the dem...
M. Al-Ghamdi, Adam P. Chester, Stephen A. Jarvis
IEEECIT
2010
IEEE
13 years 5 months ago
Hiding Short Secret Messages based on Linguistic Steganography and Manual Annotation
—This article shows to what extent it is possible to develop a public simple mechanism for hiding information in natural language by means of the use of templates and manual anno...
Alfonso Muñoz Muñoz, Justo Carracedo...
IEEECIT
2010
IEEE
13 years 5 months ago
Enabling Privacy-preserving Credential-based Access Control with XACML and SAML
—In this paper we describe extensions to the access control industry standards XACML and SAML to enable privacy-preserving and credential-based access control. Rather than assumi...
Claudio Agostino Ardagna, Sabrina De Capitani di V...
IEEECIT
2010
IEEE
13 years 5 months ago
Selective and Early Threat Detection in Large Networked Systems
—The complexity of modern networked information systems, as well as all the defense-in-depth best practices, require distributed intrusion detection architectures relying on the ...
Michele Colajanni, Mirco Marchetti, Michele Messor...
IEEECIT
2010
IEEE
13 years 5 months ago
xFace: A Lightweight Web Application Engine on Multiple Mobile Platforms
With the vigorous development of the Internet, web applications have been widely used on the PC (Personal Computer) platforms. The maturity of the hardware and software platforms ...
Fan Jiang, Zhigang Feng, Lei Luo