A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Guest editor's introduction
2015
Journal of Productivity Analysis
network model. ...
Past studies use real world data to estimate distance functions. ...
doi:10.1007/s11123-015-0454-y
fatcat:iwjsa7mb5nbszhcoumoaujiore
Guest Editor's Introduction: Visualization for Cybersecurity
2006
IEEE Computer Graphics and Applications
Ma has a PhD in computer science from the University of Utah. He received the 2000 Presidential Early Career Award for Scientists and Engineers for his work in large data visualization. ...
Because the distribution of security incidents is visualized in the IP address space, the correlation between incidents and groups of computers can often be depicted. ...
doi:10.1109/mcg.2006.33
fatcat:p3aikpqrizgijkbi3zha2ewys4
Guest editor's introduction - Ubiquitous mobile computing
2003
IEEE Internet Computing
We expect that these trends in mobile devices and applications will profoundly impact computing structures and network designs. ...
Next, Luo et al. demonstrate a seamless handoff method for secure IP communications between 802.11 WLAN and cellular networks. ...
doi:10.1109/mic.2003.1189184
fatcat:cb2e3chcdngfdlylvofdcmsrqy
Guest Editor's Introduction: Wired on Wireless
2004
IEEE Security and Privacy
There are security risks, however, whenever you use wire- less in sensitive environments; the installation, operation, and maintenance of the network must be monitored closely. ...
He received a PhD from the University of Pennsylvania, an MS in computer science from Columbia University, and a BS from the United States Military Academy. ...
doi:10.1109/msp.2004.14
fatcat:ct6tb5fuczdkdedlcgrnmsxxsq
Guest Editor's Introduction to the Special Section on Social Network Security
2018
IEEE Transactions on Dependable and Secure Computing
He has served as leading guest editor of the IEEE Transactions on Dependable and Secure Computing (TDSC), special issue on Social Network Security. ...
In the past 20 years, he has been working in the broad area of cyber security, which covers network and system security, AI, data analytics, and networking. ...
doi:10.1109/tdsc.2018.2841441
fatcat:5qwhoix5e5bnvdrvapnviulhbq
Guest Editor's Introduction: Model-Driven Engineering
2006
Computer
and supervisory control and data acquisition systems, to provide users with quality-ofservice support to process the right data in the right place at the right time over a computer grid. ...
computing environment-for example, CPU, memory, and network devices-and shield them from the complexities of these environments. ...
doi:10.1109/mc.2006.58
fatcat:car37vwxxvfrpbhobimtnbdpui
Public key security systems [Guest Editor's Introduction]
1996
IEEE Micro
Wayne Patterson University o f Charleston ublic-key cryptography today is having a significant impact throughopt P the microprocessor and microcomputer world From smart cards to network protocols, from ...
to the users Just as the transition in computing devices has opened opportunibes for networking and communications, so the transition to public-key cryptography lends itself to all kinds of opportunities ...
.~~~~,~, is liecoming :I stanclartl introduction t o the modem ciyptogi.apliy in general, including p h l i clicy techniques." ...
doi:10.1109/mm.1996.502401
fatcat:rjdqk3z6cbg7lbqteyc2tmlzpi
Guest Editor's Introduction: Application-Specific Processors
2004
IEEE Micro
The next article, "High-Throughput Programmable Cryptocoprocessor," describes a high-throughput, programmable security engine for use in networking applications. ...
The new processor can unambiguously identify pointers using additional instructions to handle pointers and separate data register and pointer register files. ...
doi:10.1109/mm.2004.10
fatcat:2xmqewy6yzehbirbh2i2erhu2q
Guest Editor's Introduction: Cloud Computing for the Sciences
2009
Computing in science & engineering (Print)
Equally clear are the issues raised by the cost of electrical power and the need for communication security and data integrity. ...
Clearly, advances in technology-especially as regards network bandwidth and CPU cost-have made the idea of a distributed computing model very attractive. ...
doi:10.1109/mcse.2009.121
fatcat:zteswcnhinetloew6k5v36wyca
Guest Editor's Introduction: AJIC Focus Section on Cybersecurity
2017
The African journal of information and communication
This introduction to the AJIC Focus Section on Cybersecurity provides the context for the section, introduces the three articles, and establishes the importance of ongoing emperical research in support ...
of policy and strategy in the cybersecurity domain. ...
Continental instruments such as the African Union Convention on Cyber Introduction: AJIC Focus Section on Cybersecurity Security and Personal Data Protection have also being mooted, and the ratification ...
doi:10.23962/10539/23575
fatcat:ncf4zruwgncbjdsab4khydwley
Guest Editor's Introduction: The State of Web Security
2006
IEEE Security and Privacy
Such is the same with security; whereas in the '90s most attacks targeted networks, today most target the applications that run on top of them. ...
He has a PhD in computer science from the University of Kent at Canterbury, UK. He is the coauthor of How to Break Web Software (Addison-Wesley, 2006) . ...
doi:10.1109/msp.2006.88
fatcat:bjqcqkgcxnhb5on3juaewhyku4
Security and Privacy in Web 2.0 [Guest editor's introduction]
2014
IEEE Internet Computing
His research interests are privacy and security. Grandison received a PhD in computer science from the Imperial College of Science, Technology, & Medicine in London. ...
In This Issue Forward secrecy guarantees that eavesdroppers simply can't reveal secret data from past communications. ...
doi:10.1109/mic.2014.119
fatcat:jbbxmbmwofhzdccau56mcs3r7e
Guest Editor's Introduction: Special Section on High Dependability Systems
2020
IEEE Transactions on Emerging Topics in Computing
Errors are detected and handled by three mechanisms, which are distributed in several layers of the network stack. ...
In "LEXACT: Low Energy N-Modular Redundancy Using Approximate Computing for Real-Time Multicore Processors," F. Baharvand and S. G. ...
Errors are detected and handled by three mechanisms, which are distributed in several layers of the network stack. ...
doi:10.1109/tetc.2020.2995450
fatcat:yri5skqfe5ahbepw5sxzcxzisq
Guest editor's introduction: Ontology issues and applications
2005
Journal of the Brazilian Computer Society
INTRODUCTION After being studied by philosophers for twenty three centuries, "ontologies" have recently become a new buzzword in computer science. ...
., semantic networks, frames and description logics definitions). ...
doi:10.1590/s0104-65002005000300001
fatcat:jnguchoeqnaabhsmjfe43c6yoa
Guest Editor's Introduction: Infrastructure Security--Reliability and Dependability of Critical Systems
2005
IEEE Security and Privacy
In addition to physical vulnerability, we must also consider power systems' increased susceptibility to disruptions in computer networks and communications systems. ...
In particular, security adds data "overhead" and timing delays that could disrupt realtime operations, which means that issues of time and bandwidth will also have to be solved. ...
doi:10.1109/msp.2005.68
fatcat:fgchkpckqbeafeo4q5h6vy5cyu
« Previous
Showing results 1 — 15 out of 862 results