Sciweavers

83 search results - page 16 / 17
» dam 2006
Sort
View
JCS
2010
122views more  JCS 2010»
13 years 3 months ago
Provably correct inline monitoring for multithreaded Java-like programs
Inline reference monitoring is a powerful technique to enforce security policies on untrusted programs. The security-by-contract paradigm proposed by the EU FP6 S3 MS project uses...
Mads Dam, Bart Jacobs 0002, Andreas Lundblad, Fran...
DSD
2006
IEEE
116views Hardware» more  DSD 2006»
13 years 11 months ago
Hardware/Software Co-design Applied to Reed-Solomon Decoding for the DMB Standard
This paper addresses the implementation of ReedSolomon decoding for battery-powered wireless devices. The scope of this paper is constrained by the Digital Media Broadcasting (DMB...
Arjan C. Dam, Michel G. J. Lammertink, Kenneth C. ...
DAGSTUHL
2006
13 years 6 months ago
Denial of Service Protection with Beaver
We present Beaver, a method and architecture to "build dams" to protect servers from Denial of Service (DoS) attacks. Beaver allows efficient filtering of DoS traffic us...
Gal Badishi, Idit Keidar, Amir Herzberg, Oleg Roma...
ASWEC
2006
IEEE
13 years 11 months ago
An agent-oriented approach to change propagation in software evolution
Software maintenance and evolution are inevitable activities since almost all software that is useful and successful stimulates user-generated requests for change and improvements...
Khanh Hoa Dam, Michael Winikoff, Lin Padgham
ICAT
2006
IEEE
13 years 11 months ago
Study on Data Collaboration Service for Collaborative Virtual Geographic Environment
The use of Collaborative Virtual Geographic Environments (CVGE) is one of the most promising uses of virtual reality in geographic field. Data collaboration can support multi-direc...
Jun Zhu, Jianhua Gong, Hua Qi, Tao Song