Computer Science: Recent submissions
Now showing items 1441-1460 of 2149
-
Keys don't grow in threes
(IEEE, 2009)Many Internet security mechanisms depend on the use of cryptographic algorithms for various forms of authentication and confidentiality. Even when well-known and standardized cryptographic algorithms are used in well-known ... -
Why Don't We Encrypt Our Email?
(IEEE, 2009)Today, almost all the programs we use to send and receive email include support for strong security mechanisms that we can apply end-to-end. But we generally don't use those - why is that? In this article, the author briefly ... -
DTN: An Architectural Retrospective
(IEEE, 2008)We review the rationale behind the current design of the Delay/Disruption Tolerant Networking (DTN) Architecture and highlight some remaining open issues. Its evolution, from a focus on deep space to a broader class of ... -
Password policy purgatory
(IEEE, 2008)IT system users, (all of us), and administrators, (increasingly large numbers of us), must all manage some passwords. In this article, the author reviews some issues related to password policies and concludes that managing ... -
Portable storage and data loss
(IEEE, 2008)Data loss or leakage occurs in many organizations, frequently with significant impacts, both in terms of incident-handling costs and of damage to the organization's reputation. In this paper, the author considers information ... -
Security Boundaries
(2008)Security boundaries are usually defined by a set of systems that are under a single administrative control. These boundaries occur at various levels, and vulnerabilities can become apparent as data crosses each boundary. ... -
Transmission protocols for challenging networks: : LTP and LTP-T
(IEEE, 2007)Challenging networks require transmission protocols able to deal with the specificities of the environment. These adverse conditions include very long delays (delays in hours are normal), episodic connectivity, asymmetric ... -
Let me tell you something about (y)our culture?
(Hacetteppe University Department of Information Management, 2010)Each person is born into a culture that is mediated by the mother tongue. Further development of the person is often associated with schooling and education. At an early age some persons will come into contact with other ... -
Breaking out for Bologna 2010
(2010-04-07) -
Life after Digitization, Deschooling Society 2010 & beyond
(2010)Schooling may now considered to be an instrinsic part of the society. The term may be taken to cover all those formal institutions established to school young people from approximately the age of 7-11 (primary school), ... -
Supporting "Personalisation for All" through Federated User Model Exchange Services (FUMES)
(2007)The growth of applications as services has been rapid. The emergence of various standards has made it much easier to provide basic levels of service interoperability. However, in personalisation and eLearning services ... -
A Semi-Automatic Indexing System for Cell Images
(IEEE, 2008)A method is described that can be used for annotating and indexing an arbitrary set of images with texts collateral to the images. The collateral texts comprise digitised texts, e.g. journal papers and newspapers in which ... -
Web-based case studies for continuous professional development via the VICOCITY case study support tool
(Springer-Verlag, 2009)Web-based case studies offer some significant advantages over the traditional paper-based ones. The results from three uses of a Web-supported case study tool giving advantages and disadvantages are discussed from the ... -
An Evaluation of Aspect-Oriented Programming for Java-based Real-Time Systems Development
(2004)Some concerns, such as debugging or logging functionality, cannot be captured cleanly, and are often tangled and scattered throughout the code base. These concerns are called crosscutting concerns. Aspect- Oriented ... -
Ontological semantics for gathering and routing contextual knowledge in highly distributed autonomic systems
(2007)Much recent research has focused on applying Autonomic Computing principles to achieve constrained self-management in adaptive systems, through self-monitoring and analysis, strategy planning, and self adjustment. However, ... -
Techniques for Dynamic Adaptation of Mobile Services
(Auerbach Publications, 2006)This chapter discusses the dynamic adaptation of software for mobile computing. The primary focus of the chapter is to discuss a number of techniques for adapting software as it runs, and managing the application of those ... -
The Denotational Semantics of Slotted-Circus
(Springer, 2009) -
Slotted-Circus: A UTP-Family of Reactive Theories
(Springer, 2007)We present a generic framework of UTP theories for describing systems whose behaviour is characterised by regular time-slots, compatible with the general structure of the Circus language [WC01a]. This ?slotted-Circus? ... -
Concurrent Models of Flash Memory Device Behaviour
(Springer, 2009)We present a CSP model of the internal behaviour of Flash Memory, based on its specification by the Open Nand-Flash Interface (ONFi) consortium. This contributes directly to the low-level modelling of the data-storage ... -
Mechanising a Formal Model of Flash Memory
(2009)We present second steps in the construction of formal models of NAND flash memory, based on a recently emerged open standard for such devices. The model is intended as a key part of a pilot project to develop a verified ...