Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








862 Hits in 3.5 sec

Guest editor's introduction

Suthathip Yaisawarng
2015 Journal of Productivity Analysis  
network model.  ...  Past studies use real world data to estimate distance functions.  ... 
doi:10.1007/s11123-015-0454-y fatcat:iwjsa7mb5nbszhcoumoaujiore

Guest Editor's Introduction: Visualization for Cybersecurity

Kwan-Liu Ma
2006 IEEE Computer Graphics and Applications  
Ma has a PhD in computer science from the University of Utah. He received the 2000 Presidential Early Career Award for Scientists and Engineers for his work in large data visualization.  ...  Because the distribution of security incidents is visualized in the IP address space, the correlation between incidents and groups of computers can often be depicted.  ... 
doi:10.1109/mcg.2006.33 fatcat:p3aikpqrizgijkbi3zha2ewys4

Guest editor's introduction - Ubiquitous mobile computing

Y.-F.R. Chen, C. Petrie
2003 IEEE Internet Computing  
We expect that these trends in mobile devices and applications will profoundly impact computing structures and network designs.  ...  Next, Luo et al. demonstrate a seamless handoff method for secure IP communications between 802.11 WLAN and cellular networks.  ... 
doi:10.1109/mic.2003.1189184 fatcat:cb2e3chcdngfdlylvofdcmsrqy

Guest Editor's Introduction: Wired on Wireless

W.A. Arbaugh
2004 IEEE Security and Privacy  
There are security risks, however, whenever you use wire- less in sensitive environments; the installation, operation, and maintenance of the network must be monitored closely.  ...  He received a PhD from the University of Pennsylvania, an MS in computer science from Columbia University, and a BS from the United States Military Academy.  ... 
doi:10.1109/msp.2004.14 fatcat:ct6tb5fuczdkdedlcgrnmsxxsq

Guest Editor's Introduction to the Special Section on Social Network Security

Meikang Qiu, Yang Xiang, Yan Zhang
2018 IEEE Transactions on Dependable and Secure Computing  
He has served as leading guest editor of the IEEE Transactions on Dependable and Secure Computing (TDSC), special issue on Social Network Security.  ...  In the past 20 years, he has been working in the broad area of cyber security, which covers network and system security, AI, data analytics, and networking.  ... 
doi:10.1109/tdsc.2018.2841441 fatcat:5qwhoix5e5bnvdrvapnviulhbq

Guest Editor's Introduction: Model-Driven Engineering

D.C. Schmidt
2006 Computer  
and supervisory control and data acquisition systems, to provide users with quality-ofservice support to process the right data in the right place at the right time over a computer grid.  ...  computing environment-for example, CPU, memory, and network devices-and shield them from the complexities of these environments.  ... 
doi:10.1109/mc.2006.58 fatcat:car37vwxxvfrpbhobimtnbdpui

Public key security systems [Guest Editor's Introduction]

M. Abdelguerfi, B.S. Kaliski, W. Patterson
1996 IEEE Micro  
Wayne Patterson University o f Charleston ublic-key cryptography today is having a significant impact throughopt P the microprocessor and microcomputer world From smart cards to network protocols, from  ...  to the users Just as the transition in computing devices has opened opportunibes for networking and communications, so the transition to public-key cryptography lends itself to all kinds of opportunities  ...  .~~~~,~, is liecoming :I stanclartl introduction t o the modem ciyptogi.apliy in general, including p h l i clicy techniques."  ... 
doi:10.1109/mm.1996.502401 fatcat:rjdqk3z6cbg7lbqteyc2tmlzpi

Guest Editor's Introduction: Application-Specific Processors

A. Veidenbaum
2004 IEEE Micro  
The next article, "High-Throughput Programmable Cryptocoprocessor," describes a high-throughput, programmable security engine for use in networking applications.  ...  The new processor can unambiguously identify pointers using additional instructions to handle pointers and separate data register and pointer register files.  ... 
doi:10.1109/mm.2004.10 fatcat:2xmqewy6yzehbirbh2i2erhu2q

Guest Editor's Introduction: Cloud Computing for the Sciences

Francis Sullivan
2009 Computing in science & engineering (Print)  
Equally clear are the issues raised by the cost of electrical power and the need for communication security and data integrity.  ...  Clearly, advances in technology-especially as regards network bandwidth and CPU cost-have made the idea of a distributed computing model very attractive.  ... 
doi:10.1109/mcse.2009.121 fatcat:zteswcnhinetloew6k5v36wyca

Guest Editor's Introduction: AJIC Focus Section on Cybersecurity

Kiru Pillay
2017 The African journal of information and communication  
This introduction to the AJIC Focus Section on Cybersecurity provides the context for the section, introduces the three articles, and establishes the importance of ongoing emperical research in support  ...  of policy and strategy in the cybersecurity domain.  ...  Continental instruments such as the African Union Convention on Cyber Introduction: AJIC Focus Section on Cybersecurity Security and Personal Data Protection have also being mooted, and the ratification  ... 
doi:10.23962/10539/23575 fatcat:ncf4zruwgncbjdsab4khydwley

Guest Editor's Introduction: The State of Web Security

M. Andrews
2006 IEEE Security and Privacy  
Such is the same with security; whereas in the '90s most attacks targeted networks, today most target the applications that run on top of them.  ...  He has a PhD in computer science from the University of Kent at Canterbury, UK. He is the coauthor of How to Break Web Software (Addison-Wesley, 2006) .  ... 
doi:10.1109/msp.2006.88 fatcat:bjqcqkgcxnhb5on3juaewhyku4

Security and Privacy in Web 2.0 [Guest editor's introduction]

Tyrone Grandison
2014 IEEE Internet Computing  
His research interests are privacy and security. Grandison received a PhD in computer science from the Imperial College of Science, Technology, & Medicine in London.  ...  In This Issue Forward secrecy guarantees that eavesdroppers simply can't reveal secret data from past communications.  ... 
doi:10.1109/mic.2014.119 fatcat:jbbxmbmwofhzdccau56mcs3r7e

Guest Editor's Introduction: Special Section on High Dependability Systems

CECILIA Metra, MATTEO Sonza Reorda
2020 IEEE Transactions on Emerging Topics in Computing  
Errors are detected and handled by three mechanisms, which are distributed in several layers of the network stack.  ...  In "LEXACT: Low Energy N-Modular Redundancy Using Approximate Computing for Real-Time Multicore Processors," F. Baharvand and S. G.  ...  Errors are detected and handled by three mechanisms, which are distributed in several layers of the network stack.  ... 
doi:10.1109/tetc.2020.2995450 fatcat:yri5skqfe5ahbepw5sxzcxzisq

Guest editor's introduction: Ontology issues and applications

Fred Freitas, Heiner Stuckenschmidt, Natalya F. Noy
2005 Journal of the Brazilian Computer Society  
INTRODUCTION After being studied by philosophers for twenty three centuries, "ontologies" have recently become a new buzzword in computer science.  ...  ., semantic networks, frames and description logics definitions).  ... 
doi:10.1590/s0104-65002005000300001 fatcat:jnguchoeqnaabhsmjfe43c6yoa

Guest Editor's Introduction: Infrastructure Security--Reliability and Dependability of Critical Systems

M. Amin
2005 IEEE Security and Privacy  
In addition to physical vulnerability, we must also consider power systems' increased susceptibility to disruptions in computer networks and communications systems.  ...  In particular, security adds data "overhead" and timing delays that could disrupt realtime operations, which means that issues of time and bandwidth will also have to be solved.  ... 
doi:10.1109/msp.2005.68 fatcat:fgchkpckqbeafeo4q5h6vy5cyu
« Previous Showing results 1 — 15 out of 862 results