Sciweavers

16 search results - page 3 / 4
» Enhancement of the RFID security method with ownership trans...
Sort
View
PLDI
2003
ACM
13 years 11 months ago
A practical flow-sensitive and context-sensitive C and C++ memory leak detector
This paper presents a static analysis tool that can automatically find memory leaks and deletions of dangling pointers in large C and C++ applications. We have developed a type s...
David L. Heine, Monica S. Lam
CIA
1998
Springer
13 years 10 months ago
Enhancing Mobile Agents with Electronic Commerce Capabilities
The paradigm of mobile agents offers a powerful and flexible ity to develop distributed applications on a high-level of abstraction. One of the most interesting tasks for mobile ag...
Hartmut Vogler, Marie-Luise Moschgath, Thomas Kunk...
ICPR
2008
IEEE
14 years 6 days ago
Remote multimodal biometric authentication using bit priority-based fragile watermarking
We propose a new remote multimodal biometric authentication framework based on fragile watermarking for transferring multi-biometrics over networks to server for authentication. A...
Tuan Hoang, Dat Tran, Dharmendra Sharma
MIE
2008
194views Healthcare» more  MIE 2008»
13 years 7 months ago
Developing a Shared Electronic Health Record for Patients and Clinicians
Improving Shared Decision Making (SDM) and patient-provider communication, and providing all citizens with equal access to health information has become a high priority health poli...
Cornelia M. Ruland, Haakon Bryhni, Roar Andersen, ...
PEPM
2010
ACM
14 years 2 months ago
Context-sensitive analysis of obfuscated x86 executables
A method for context-sensitive analysis of binaries that may have obfuscated procedure call and return operations is presented. Such binaries may use operators to directly manipul...
Arun Lakhotia, Davidson R. Boccardo, Anshuman Sing...