Sciweavers

16725 search results - page 3092 / 3345
» Engineering Software Correctness
Sort
View
ACSAC
2007
IEEE
15 years 10 months ago
Channels: Runtime System Infrastructure for Security-Typed Languages
Security-typed languages (STLs) are powerful tools for provably implementing policy in applications. The programmer maps policy onto programs by annotating types with information ...
Boniface Hicks, Tim Misiak, Patrick McDaniel
COMSWARE
2007
IEEE
15 years 10 months ago
An Architecture and a Programming Interface for Application-Aware Data Dissemination Using Overlay Networks
- Many real-time distributed collaborative applications are emerging that require exchange of critical sensor data among geographically distant end users under resource-constrained...
Tarun Banka, Panho Lee, Anura P. Jayasumana, Jim K...
COMSWARE
2007
IEEE
15 years 10 months ago
Exploiting Energy-aware Spatial Correlation in Wireless Sensor Networks
Abstract— Wireless sensor networks (WSNs) promise finegrain monitoring in a wide variety of applications, which require dense sensor nodes deployment. Due to high density of nod...
Ghalib A. Shah, Muslim Bozyigit
COMSWARE
2007
IEEE
15 years 10 months ago
Integrated Data Location in Multihop Wireless Networks
Abstract— Multihop wireless networks are ideal as infrastructures for location-aware network applications, particularly for disaster recovery operations. However, one missing com...
Irfan Sheriff, Prashanth Aravinda Kumar Acharya, A...
COMSWARE
2007
IEEE
15 years 10 months ago
Competition between SOM Clusters to Model User Authentication System in Computer Networks
—Traditional authentication systems employed on Internet are facing an acute problem of intrusions. In this context we propose a neural architecture for user authentication throu...
Shrijit S. Joshi, Vir V. Phoha
« Prev « First page 3092 / 3345 Last » Next »