Sciweavers

691 search results - page 86 / 139
» Control Choices and Network Effects in Hypertext Systems
Sort
View
GLOBECOM
2007
IEEE
15 years 8 months ago
Auction-Based Distributed Resource Allocation for Cooperation Transmission in Wireless Networks
Abstract— Cooperative transmission can greatly improve communication system performance by taking advantage of the broadcast nature of wireless channels. Most previous work on re...
Jianwei Huang, Zhu Han, Mung Chiang, H. Vincent Po...
HICSS
2005
IEEE
140views Biometrics» more  HICSS 2005»
15 years 7 months ago
On Contamination in Information Ecosystems
1 On the Internet, digitally active small and medium sized enterprises (SME) face numerous security risks. When SMEs join networks, business ideas and malicious activities may inte...
Bengt Carlsson, Andreas Jacobsson
NDSS
2005
IEEE
15 years 7 months ago
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage
In 1998, Blaze, Bleumer, and Strauss proposed an application called atomic proxy re-encryption, in which a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for...
Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan ...
PLDI
2009
ACM
15 years 8 months ago
Catch me if you can: permissive yet secure error handling
Program errors are a source of information leaks. Tracking these leaks is hard because error propagation breaks out of program structure. Programming languages often feature excep...
Aslan Askarov, Andrei Sabelfeld
121
Voted
SEKE
2009
Springer
15 years 8 months ago
An Architecture-based Evolution Management Method for Software Product Line
In software product line (SPL) development, evolutions occur in core assets and application products. How to ensure their alignment in evolution is a big challenge. Products in an...
Xin Peng, Liwei Shen, Wenyun Zhao