Zobrazeno 1 - 10
of 264
pro vyhledávání: '"Marcel Waldvogel"'
Publikováno v:
ICISSP
We propose and apply a requirements engineering approach that focuses on security and privacy properties and takes into account various stakeholder interests. The proposed methodology facilitates the integration of security and privacy by design into
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030026707
OTM Conferences (2)
OTM Conferences (2)
We identify 74 generic, reusable technical requirements based on the GDPR that can be applied to software products which process personal data. The requirements can be traced to corresponding articles and recitals of the GDPR and fulfill the key prin
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::358d88814e668ad8144b07182aa504d8
https://doi.org/10.1007/978-3-030-02671-4_15
https://doi.org/10.1007/978-3-030-02671-4_15
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319607733
AIMS
Lecture Notes in Computer Science
11th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS)
11th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jul 2017, Zurich, Switzerland. pp.131-136, ⟨10.1007/978-3-319-60774-0_10⟩
AIMS
Lecture Notes in Computer Science
11th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS)
11th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jul 2017, Zurich, Switzerland. pp.131-136, ⟨10.1007/978-3-319-60774-0_10⟩
Today most used devices are connected with each other building the Internet of Things (IoT). They communicate with each other directly and share data with a plethora of other devices indirectly by using the underlying network infrastruc- ture. In bot
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c254e5fbbfb427195732b5686c50a5f5
https://doi.org/10.1007/978-3-319-60774-0_10
https://doi.org/10.1007/978-3-319-60774-0_10
Publikováno v:
Schweizerische Ärztezeitung. 99:647-648
Publikováno v:
ICDCS Workshops
When mobile devices at the network edge want to communicate with each other, they too often depend on the availability of faraway resources. For direct communication, feasible user-friendly service discovery is essential. DNS Service Discovery over M
Publikováno v:
Wireless Engineering and Technology. :132-141
Most of the existing opportunistic network routing protocols are based on some type of utility function that is directly or indirectly dependent on the past behavior of devices. The past behavior or history of a device is usually referred to as conta
Publikováno v:
Cartography and Geographic Information Science. 36:281-293
We propose a new, streamlined, two-step geographic visual analytics (GVA) workflow for efficient data storage and access based on a native web XML database called TreeTank coupled with a Scalable Vector Graphics (SVG) graphical user interface for vis
Autor:
Thomas Zink, Marcel Waldvogel
Publikováno v:
SpringerPlus
Hashing has yet to be widely accepted as a component of hard real-time systems and hardware implementations, due to still existing prejudices concerning the unpredictability of space and time requirements resulting from collisions. While in theory pe
Autor:
Laurent Frelechoux, Patrick Droz, Robert Haas, Marcel Waldvogel, Lukas Kencl, Roman A. Pletka, C. Jeffries, Bernard Metzler, Andreas Kind
Publikováno v:
IEEE Network. 17:46-54
In this paper, we present five case studies of advanced networking functions that detail how a network processor (NP) can provide high performance and also the necessary flexibility compared with Application-Specific Integrated Circuits (ASICs). We f
Autor:
G. T. Davis, B. M. Bass, M. A. Rinaldi, Jean Calvignac, R. H. Boivie, M. Heddes, R. K. Sabhikhi, Marcel Waldvogel, Mohammad Peyravian, C. Basso, J. R. Allen, Andreas Herkersdorf, L. Frelechoux, J. F. Logan, A. Kind, M. S. Siegel
Publikováno v:
Scopus-Elsevier
Deep packet processing is migrating to the edges of service provider networks to simplify and speed up core functions. On the other hand, the cores of such networks are migrating to the switching of high-speed traffic aggregates, e.g., using switchin