Sciweavers

42 search results - page 3 / 9
» Characterization of Error-Tolerant Applications when Protect...
Sort
View
EIT
2008
IEEE
14 years 13 days ago
Architectural support for securing application data in embedded systems
—The rapid growth and pervasive use of embedded systems makes it easier for an adversary to gain physical access to these devices to launch attacks and reverse engineer of the sy...
Olga Gelbart, Eugen Leontie, Bhagirath Narahari, R...
MSWIM
2005
ACM
13 years 11 months ago
Adaptive transmission opportunity with admission control for IEEE 802.11e networks
The increase of IEEE 802.11’s bandwidth led to a deployment of many multimedia applications over wireless networks. Nevertheless, these applications impose stringent constraints...
Adlen Ksentini, Abdelhak Guéroui, Mohamed N...
SELMAS
2004
Springer
13 years 11 months ago
Adaptive Access Control in Coordination-Based Mobile Agent Systems
The increased pervasiveness of mobile devices like cell phones, PDAs, and laptops draws attention to the need for coordination among these networked devices. The very nature of the...
Christine Julien, Jamie Payton, Gruia-Catalin Roma...
SDM
2012
SIAM
247views Data Mining» more  SDM 2012»
11 years 8 months ago
Simplex Distributions for Embedding Data Matrices over Time
Early stress recognition is of great relevance in precision plant protection. Pre-symptomatic water stress detection is of particular interest, ultimately helping to meet the chal...
Kristian Kersting, Mirwaes Wahabzada, Christoph R&...
ESSOS
2010
Springer
14 years 2 months ago
Automatic Generation of Smart, Security-Aware GUI Models
In many software applications, users access application data using graphical user interfaces (GUIs). There is an important, but little explored, link between visualization and secu...
David A. Basin, Manuel Clavel, Marina Egea, Michae...