Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Bill Caelli"'
Publikováno v:
ACSW
As moving towards cloud-based real-time services, we are witnessing the shift from a technology-driven services to service provisioning paradigms, that is, from Quality of Service (QoS) to Quality of Experience (QoE). User experience and satisfaction
Publikováno v:
SoftCOM
Recently on-premises deployed real-time video conferencing (VC) systems have been facing the growing resource demand from using desktop and mobile devices. To address the cost of upgrading the existing on-promises VC infrastructure, businesses are mo
Autor:
Melissa Dark, Lance C. Perez, Richard A. Raines, Christine Nickell, Bill Caelli, Charles P. Pfleeger, Lance J. Hoffman, Stephen Cooper, Elizabeth K. Hawthorne, Brenda Oldfield, Corey D. Schou, Victor Piotrowski, Joel Brynielsson, Matt Bishop, Ali E. Abdallah
Publikováno v:
ACM SIGCSE Bulletin. 41:109-125
Information Assurance and computer security are serious worldwide concerns of governments, industry, and academia. Computer security is one of the three new focal areas of the ACM/IEEE's Computer Science Curriculum update in 2008. This ACM/IEEE repor
Publikováno v:
Studies in health technology and informatics. 129(Pt 1)
Ongoing concerns have been raised over the effectiveness of information technology products and systems in maintaining privacy protection for sensitive data. The aim is to ensure that sensitive health information can be adequately protected yet still
Publikováno v:
Advances in Cryptology — AUSCRYPT '90 ISBN: 3540530002
AUSCRYPT
AUSCRYPT
Several DES replacement block ciphers have been published. In this paper a report will be given on the development of a package for analysis and comparison of block ciphers. Experimental results are presented on applying this package to DES, FEAL-N,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ac4face2a2d3185ebdc5da7ee8b4df94
https://doi.org/10.1007/bfb0030362
https://doi.org/10.1007/bfb0030362
Autor:
(Bill) Caelli, William J.
Publikováno v:
In Computers & Security June 2012 31(4):637-637