Sciweavers

2726 search results - page 426 / 546
» Application security support in the operating system kernel
Sort
View
154
Voted
HICSS
1999
IEEE
155views Biometrics» more  HICSS 1999»
15 years 9 months ago
Agent Communication Languages for Information-Centric Agent Communities
As the complexity and application scope of agent-based systems increases, the requirements placed on Agent Communication Languages have also increased with it. Currently-available...
Marian H. Nodine, Damith Chandrasekara
154
Voted
CCS
2008
ACM
15 years 7 months ago
Code injection attacks on harvard-architecture devices
Harvard architecture CPU design is common in the embedded world. Examples of Harvard-based architecture devices are the Mica family of wireless sensors. Mica motes have limited me...
Aurélien Francillon, Claude Castelluccia
ICES
2005
Springer
176views Hardware» more  ICES 2005»
15 years 10 months ago
Consensus-Based Evaluation for Fault Isolation and On-line Evolutionary Regeneration
While the fault repair capability of Evolvable Hardware (EH) approaches have been previously demonstrated, further improvements to fault handling capability can be achieved by exp...
Kening Zhang, Ronald F. DeMara, Carthik A. Sharma
NOSSDAV
2009
Springer
15 years 11 months ago
Robust live media streaming in swarms
Data dissemination in decentralized networks is often realized by using some form of swarming technique. Swarming enables nodes to gather dynamically in order to fulfill a certai...
Thomas Locher, Remo Meier, Roger Wattenhofer, Stef...
PADL
2012
Springer
14 years 17 days ago
Typing the Numeric Tower
In the past, the creators of numerical programs had to choose between simple expression of mathematical formulas and static type checking. While the Lisp family and its dynamically...
Vincent St-Amour, Sam Tobin-Hochstadt, Matthew Fla...