Sciweavers

7778 search results - page 1317 / 1556
» Designing Controllers for Reachability
Sort
View
CCS
2008
ACM
15 years 6 months ago
SOMA: mutual approval for included content in web pages
Unrestricted information flows are a key security weakness of current web design. Cross-site scripting, cross-site request forgery, and other attacks typically require that inform...
Terri Oda, Glenn Wurster, Paul C. van Oorschot, An...
CCS
2008
ACM
15 years 6 months ago
A fast real-time memory authentication protocol
We propose a new real-time authentication scheme for memory. As in previous proposals the scheme uses a Merkle tree to guarantee dynamic protection of memory. We use the universal...
Yin Hu, Ghaith Hammouri, Berk Sunar
CISS
2008
IEEE
15 years 6 months ago
Cross-layer multicommodity capacity expansion on ad hoc wireless networks of cognitive radios
Cognitive radios permit dynamic control of physical layer resources such as transmission power and constellation size; these degrees of freedom can be employed to achieve significa...
Alex Fridman, Steven Weber, Kapil R. Dandekar, Mos...
ADAEUROPE
2005
Springer
15 years 6 months ago
RT-EP: A Fixed-Priority Real Time Communication Protocol over Standard Ethernet
This paper presents the design and implementation of RT-EP (Real-Time Ethernet Protocol), which is a software-based token-passing Ethernet protocol for multipoint communications in...
José María Martínez, Michael ...
ATAL
2005
Springer
15 years 6 months ago
Automated resource-driven mission phasing techniques for constrained agents
A constrained agent is limited in the actions that it can take at any given time, and a challenging problem is to design policies for such agents to do the best they can despite t...
Jianhui Wu, Edmund H. Durfee
« Prev « First page 1317 / 1556 Last » Next »