Sciweavers

79 search results - page 9 / 16
» Distributed Authorization Using Delegation with Acyclic Path...
Sort
View
IEEEPACT
2002
IEEE
15 years 2 months ago
Eliminating Exception Constraints of Java Programs for IA-64
Java exception checks are designed to ensure that any faulting instruction causing a hardware exception does not terminate the program abnormally. These checks, however, impose so...
Kazuaki Ishizaki, Tatsushi Inagaki, Hideaki Komats...
169
Voted
CADE
2011
Springer
13 years 9 months ago
Deciding Security for Protocols with Recursive Tests
Abstract. Security protocols aim at securing communications over public networks. Their design is notoriously difficult and error-prone. Formal methods have shown their usefulness ...
Mathilde Arnaud, Véronique Cortier, St&eacu...
ICPR
2006
IEEE
15 years 10 months ago
Measurement Function Design for Visual Tracking Applications
Extracting human postural information from video sequences has proved a difficult research question. The most successful approaches to date have been based on particle filtering, ...
Andrew W. B. Smith, Brian C. Lovell
ICDCS
2008
IEEE
15 years 3 months ago
DCAR: Distributed Coding-Aware Routing in Wireless Networks
—Recently, there has been a growing interest of using network coding to improve the performance of wireless networks, for example, authors of [1] proposed the practical wireless ...
Jilin Le, John C. S. Lui, Dah-Ming Chiu
USITS
2001
14 years 10 months ago
CANS: Composable, Adaptive Network Services Infrastructure
Ubiquitous access to sophisticated internet services from diverse end devices across heterogeneous networks requires the injection of additional functionality into the network to ...
Xiaodong Fu, Weisong Shi, Anatoly Akkerman, Vijay ...