Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Arne-Kristian Groven"'
Publikováno v:
Computer Science Education. 13:331-335
(2003). Comprehensive Object-Oriented Learning – An Introduction. Computer Science Education: Vol. 13, No. 4, pp. 331-335.
Publikováno v:
Communications in Computer and Information Science ISBN: 9783642314780
AmI Workshops
AmI Workshops
End-users on the Internet of Things (IoT) will encounter many different devices and services; they will need to decide whether or not they can trust these devices and services with their information. We identify three items of trust information that
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::63d0e4219ca9c34d941accae3326844d
https://doi.org/10.1007/978-3-642-31479-7_46
https://doi.org/10.1007/978-3-642-31479-7_46
Publikováno v:
EUROMICRO-SEAA
Selecting the right software is of crucial importance for businesses. Free/Libre Open Source Software (FLOSS) quality models can ease this decision-making. This paper introduces a distinction between first and second generation quality models. The fo
Publikováno v:
ECSA Companion Volume
This article, presents a comparison of a first generation software quality assessment model (OpenBRR) and a second generation model (QualOSS) by applying them to the case of Asterisk, a FLOSS implementation of a telephone private branch exchange (PBX
Publikováno v:
ICN
This paper describes the approach and preliminary results from the research project EUX2010sec. The project works closely with Voice-over-IP (VoIP) companies and users. It aims at providing better security of open source VoIP installations. The work
Publikováno v:
Information Security Practice and Experience ISBN: 9783642008429
ISPEC
ISPEC
Many protocols running over the Internet are neither formalised, nor formally analysed. The amount of documentation for tele- communication protocols used in real-life applications is huge, while the available analysis methods and tools require preci
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b33ae31dc22ff4c7b98dfb7da09cc749
https://doi.org/10.1007/978-3-642-00843-6_16
https://doi.org/10.1007/978-3-642-00843-6_16
Publikováno v:
2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications.
We address issues related to threat assessment of mobile patient monitoring systems using a wireless infrastructure including body area biomedical sensor networks. Several user scenarios are presented. Patient sensitive data, mobile and wireless infr