Now showing items 1441-1460 of 2149

    • Keys don't grow in threes 

      FARRELL, STEPHEN (IEEE, 2009)
      Many Internet security mechanisms depend on the use of cryptographic algorithms for various forms of authentication and confidentiality. Even when well-known and standardized cryptographic algorithms are used in well-known ...
    • Why Don't We Encrypt Our Email? 

      FARRELL, STEPHEN (IEEE, 2009)
      Today, almost all the programs we use to send and receive email include support for strong security mechanisms that we can apply end-to-end. But we generally don't use those - why is that? In this article, the author briefly ...
    • DTN: An Architectural Retrospective 

      FARRELL, STEPHEN (IEEE, 2008)
      We review the rationale behind the current design of the Delay/Disruption Tolerant Networking (DTN) Architecture and highlight some remaining open issues. Its evolution, from a focus on deep space to a broader class of ...
    • Password policy purgatory 

      FARRELL, STEPHEN (IEEE, 2008)
      IT system users, (all of us), and administrators, (increasingly large numbers of us), must all manage some passwords. In this article, the author reviews some issues related to password policies and concludes that managing ...
    • Portable storage and data loss 

      FARRELL, STEPHEN (IEEE, 2008)
      Data loss or leakage occurs in many organizations, frequently with significant impacts, both in terms of incident-handling costs and of damage to the organization's reputation. In this paper, the author considers information ...
    • Security Boundaries 

      FARRELL, STEPHEN (2008)
      Security boundaries are usually defined by a set of systems that are under a single administrative control. These boundaries occur at various levels, and vulnerabilities can become apparent as data crosses each boundary. ...
    • Transmission protocols for challenging networks: : LTP and LTP-T 

      FARRELL, STEPHEN (IEEE, 2007)
      Challenging networks require transmission protocols able to deal with the specificities of the environment. These adverse conditions include very long delays (delays in hours are normal), episodic connectivity, asymmetric ...
    • Let me tell you something about (y)our culture? 

      MAC an AIRCHINNIGH, MICHEAL (Hacetteppe University Department of Information Management, 2010)
      Each person is born into a culture that is mediated by the mother tongue. Further development of the person is often associated with schooling and education. At an early age some persons will come into contact with other ...
    • Breaking out for Bologna 2010 

      MAC an AIRCHINNIGH, MICHEAL (2010-04-07)
    • Life after Digitization, Deschooling Society 2010 & beyond 

      MAC an AIRCHINNIGH, MICHEAL (2010)
      Schooling may now considered to be an instrinsic part of the society. The term may be taken to cover all those formal institutions established to school young people from approximately the age of 7-11 (primary school), ...
    • Supporting "Personalisation for All" through Federated User Model Exchange Services (FUMES) 

      DAGGER, DECLAN; WADE, VINCENT PATRICK; WALSH, EDMOND (2007)
      The growth of applications as services has been rapid. The emergence of various standards has made it much easier to provide basic levels of service interoperability. However, in personalisation and eLearning services ...
    • A Semi-Automatic Indexing System for Cell Images 

      AHMAD, KHURSHID; Zheng, Choaxin; KELLEHER, DERMOT P (IEEE, 2008)
      A method is described that can be used for annotating and indexing an arbitrary set of images with texts collateral to the images. The collateral texts comprise digitised texts, e.g. journal papers and newspapers in which ...
    • Web-based case studies for continuous professional development via the VICOCITY case study support tool 

      REDMOND, JAMES ANTHONY (Springer-Verlag, 2009)
      Web-based case studies offer some significant advantages over the traditional paper-based ones. The results from three uses of a Web-supported case study tool giving advantages and disadvantages are discussed from the ...
    • An Evaluation of Aspect-Oriented Programming for Java-based Real-Time Systems Development 

      CLARKE, SIOBHAN (2004)
      Some concerns, such as debugging or logging functionality, cannot be captured cleanly, and are often tangled and scattered throughout the code base. These concerns are called crosscutting concerns. Aspect- Oriented ...
    • Ontological semantics for gathering and routing contextual knowledge in highly distributed autonomic systems 

      O'Sullivan, Declan; Lewis, David (2007)
      Much recent research has focused on applying Autonomic Computing principles to achieve constrained self-management in adaptive systems, through self-monitoring and analysis, strategy planning, and self adjustment. However, ...
    • Techniques for Dynamic Adaptation of Mobile Services 

      CAHILL, VINNY; HAAHR, MADS; KEENEY, JOHN (Auerbach Publications, 2006)
      This chapter discusses the dynamic adaptation of software for mobile computing. The primary focus of the chapter is to discuss a number of techniques for adapting software as it runs, and managing the application of those ...
    • The Denotational Semantics of Slotted-Circus 

      BUTTERFIELD, ANDREW (Springer, 2009)
    • Slotted-Circus: A UTP-Family of Reactive Theories 

      Butterfield, Andrew (Springer, 2007)
      We present a generic framework of UTP theories for describing systems whose behaviour is characterised by regular time-slots, compatible with the general structure of the Circus language [WC01a]. This ?slotted-Circus? ...
    • Concurrent Models of Flash Memory Device Behaviour 

      BUTTERFIELD, ANDREW (Springer, 2009)
      We present a CSP model of the internal behaviour of Flash Memory, based on its specification by the Open Nand-Flash Interface (ONFi) consortium. This contributes directly to the low-level modelling of the data-storage ...
    • Mechanising a Formal Model of Flash Memory 

      Butterfield, Andrew (2009)
      We present second steps in the construction of formal models of NAND flash memory, based on a recently emerged open standard for such devices. The model is intended as a key part of a pilot project to develop a verified ...