Sciweavers

878 search results - page 143 / 176
» A Compiler-Based Approach to Data Security
Sort
View
CNSR
2006
IEEE
15 years 3 months ago
Trusted Computing for Protecting Ad-hoc Routing
Ad-hoc networks rely on participation and cooperation of nodes within the network to transmit data to destinations. However, in networks where participating nodes are controlled b...
Michael Jarrett, Paul Ward
ICMCS
2006
IEEE
118views Multimedia» more  ICMCS 2006»
15 years 3 months ago
Remote Voice Acquisition in Multimodal Surveillance
Multimodal surveillance systems using visible/IR cameras and other sensors are widely deployed today for security purpose, particularly when subjects are at a large distance. Howe...
Weihong Li, Zhigang Zhu, George Wolberg
OOPSLA
2005
Springer
15 years 3 months ago
Lifting sequential graph algorithms for distributed-memory parallel computation
This paper describes the process used to extend the Boost Graph Library (BGL) for parallel operation with distributed memory. The BGL consists of a rich set of generic graph algor...
Douglas Gregor, Andrew Lumsdaine
ATAL
2004
Springer
15 years 3 months ago
Self-Protected Mobile Agents
In this paper, we present a new solution for the implementation of flexible protection mechanisms in the context of mobile agent systems, where security problems are currently a ...
Joan Ametller, Sergi Robles, Jose A. Ortega-Ruiz
ESORICS
2009
Springer
15 years 10 months ago
Reliable Evidence: Auditability by Typing
Abstract. Many protocols rely on audit trails to allow an impartial judge to verify a posteriori some property of a protocol run. However, in current practice the choice of what da...
Nataliya Guts, Cédric Fournet, Francesco Za...