Sciweavers

1186 search results - page 98 / 238
» A New Approach to Secure Logging
Sort
View
99
Voted
OOPSLA
2009
Springer
15 years 7 months ago
A market-based approach to software evolution
Software correctness has bedeviled the field of computer science since its inception. Software complexity has increased far more quickly than our ability to control it, reaching ...
David F. Bacon, Yiling Chen, David C. Parkes, Malv...
98
Voted
ENTCS
2006
180views more  ENTCS 2006»
15 years 19 days ago
Mobile Synchronizing Petri Nets: A Choreographic Approach for Coordination in Ubiquitous Systems
The term Ubiquitous Computing was coined by Mark Weiser almost two decades ago. Despite all the time that has passed since Weiser's vision, ubiquitous computing still has a l...
Fernando Rosa Velardo, Olga Marroquín Alons...
132
Voted
JSAC
2010
188views more  JSAC 2010»
14 years 7 months ago
Random-walk based approach to detect clone attacks in wireless sensor networks
Abstract--Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone attacks. In such attack, an adversary compromises a few nodes, replicates them, a...
Yingpei Zeng, Jiannong Cao, Shigeng Zhang, Shanqin...
133
Voted
KAIS
2002
144views more  KAIS 2002»
15 years 9 days ago
Correlation-Based Web Document Clustering for Adaptive Web Interface Design
A great challenge for web site designers is how to ensure users' easy access to important web pages efficiently. In this paper we present a clustering-based approach to addres...
Zhong Su, Qiang Yang, HongJiang Zhang, Xiaowei Xu,...
108
Voted
FSE
2005
Springer
118views Cryptology» more  FSE 2005»
15 years 6 months ago
A Side-Channel Analysis Resistant Description of the AES S-Box
So far, efficient algorithmic countermeasures to secure the AES algorithm against (first-order) differential side-channel attacks have been very expensive to implement. In this a...
Elisabeth Oswald, Stefan Mangard, Norbert Pramstal...