Narrow your search

Library

KU Leuven (1593)

ULiège (1386)

Odisee (1211)

VIVES (1209)

Thomas More Mechelen (1198)

Thomas More Kempen (1193)

UCLL (1183)

ULB (1157)

UGent (836)

LUCA School of Arts (746)

More...

Resource type

book (2763)

digital (307)

periodical (97)

dissertation (65)

article (7)

More...

Language

English (2675)

French (238)

German (87)

Dutch (63)

Undetermined (19)

More...

Year
From To Submit

2024 (70)

2023 (120)

2022 (247)

2021 (332)

2020 (347)

More...
Listing 1 - 10 of 3108 << page
of 311
>>
Sort by

Book
Open Source Systems & Technologies (ICOSST), 2015 International Conference on
Author:
ISBN: 1479978116 1479978132 1479978124 Year: 2015 Publisher: Piscataway, New Jersey : Institute of Electrical and Electronics Engineers (IEEE),

Loading...
Export citation

Choose an application

Bookmark

Abstract

Create scientific venue for participants can share ideas, strategies & policies for tackling development, research & adaption challenges related to open source tools & open source development environments for customized & enterprise grade applications.


Book
IEEE Std 2410-2015 : IEEE Standard for Biometric Open Protocol
Author:
ISBN: 0738199036 Year: 2015 Publisher: [Place of publication not identified] : IEEE,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Abstract: Identity assertion, role gathering, multilevel access control, assurance, and auditing are provided by the Biometric Open Protocol Standard (BOPS). The BOPS implementation includes software running on a client device (smartphone or mobile device), a trusted BOPS server, and an intrusion detection system. The BOPS implementation allows pluggable components to replace existing components' functionality, accepting integration into current operating environments in a short period of time. The BOPS implementation provides continuous protection to the resources and assurance of the placement and viability of adjudication and other key features. Accountability is the mechanism that proves a service-level guarantee of security. The BOPS implementation allows the systems to meet security needs by using the application programming interface. The BOPS implementation need not know whether the underlying system is a relational database management system or a search engine. The BOPS implementation functionality offers a "point-and-cut" mechanism to add the appropriate security to the production systems as well as to the systems in development. The architecture is language neutral, allowing Representational State Transfer (REST), JavaScript Object Notation (JSON), and Secure Sockets Layer (SSL) or Transport Layer Security to provide the communication interface. The architecture is built on the servlet specification, open SSLs, Java, JSON, REST, and an open persistent store. All tools adhere to open standards, allowing maximum interoperability. Keywords: admin console, application, BOPS admin, BOPS cluster, BOPS server, BOPS IDS, client device IDS, Jena Rules, IDS cluster, IEEE 2410, liveness, original site admin, site admin, trusted adjudicated data, user, user device.


Book
"2022 16th International Conference on Open Source Systems and Technologies (ICOSST)"
Author:
ISBN: 1665464771 9781665464772 166546478X Year: 2023 Publisher: Piscataway, NJ : IEEE,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Environmental impact of nonpoint source pollution
Author:
ISBN: 0250403390 9780250403394 Year: 1980 Publisher: Ann Arbor (Mich.): Ann Arbor science,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Source Code Analysis and Manipulation (SCAM), 2015 IEEE 15th International Working Conference on
Author:
ISBN: 1467375306 1467375292 Year: 2015 Publisher: Piscataway : IEEE,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The 15th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2015) aims to bring together researchers and practitioners working on theory, techniques, and applications that concern analysis and or manipulation of the source code of software systems The term source code refers to any fully executable description of a software system, such as machine code, (very) high level languages, and executable graphical representations of systems The term analysis refers to any (semi)automated procedure that yields insight into source code, while manipulation refers to any automated or semi automated procedure that takes and returns source code.


Book
2016 International Conference on Open Source Systems & Technologies (ICOSST) : 15-17 December, 2016, Lahore, Pakistan : proceedings
Author:
ISBN: 150905586X 1509055878 Year: 2016 Publisher: Piscataway, New Jersey : IEEE,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Annotation Create scientific venue for participants can share ideas, strategies & policies for tackling development, research & adaption challenges related to open source tools & open source development environments for customized & enterprise grade applications.


Book
2019 25th Conference of Open Innovations Association (FRUCT)
Author:
ISBN: 9526924401 1728127866 Year: 2019 Publisher: Piscataway, NJ : IEEE,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
2020 IEEE 20th International Working Conference on Source Code Analysis and Manipulation (SCAM 2020) : proceedings : 27-28 September 2020, Virtual Event
Author:
ISBN: 172819248X 1728192498 Year: 2020 Publisher: Los Alamitos, California : IEEE,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The International Conference on Software Maintenance and Evolution (ICSME) is the premier international forum for researchers and practitioners from academia, industry, and government to present, discuss, and debate the most recent ideas, experiences, and challenges in software maintenance and evolution.


Book
"2020 14th International Conference on Open Source Systems and Technologies (ICOSST)"
Author:
ISBN: 1728190509 9781728190501 1728190517 Year: 2021 Publisher: IEEE

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Der virale Effekt. Entwicklungsrisiken im Umfeld von Open Source Software
Author:
ISBN: 1000006715 386644141X Year: 2007 Publisher: KIT Scientific Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

Ausgangspunkt des Buches war die Frage, inwiefern Unternehmen Open Source Software in ihren Produkten verwenden können, ohne hierdurch Lizenzverletzungen zu verursachen.Der Untersuchungsschwerpunkt lag dabei auf dem Einsatz von Open Source Software, die unter der General Public License lizenziert (GPL) ist und umfasste somit sämtliche Fragen des unternehmensinternen (Open Source)-Lizenzmanagements.

Listing 1 - 10 of 3108 << page
of 311
>>
Sort by