Sciweavers

991 search results - page 125 / 199
» Foundations for Designing Secure Architectures
Sort
View
IADIS
2003
14 years 11 months ago
Com Technology for Remote Database Connectivity with Wireless PDAS
The potential software market for client-side mobile applications is strongly dependent upon the ability to rapidly migrate existing in-house software solutions, while maintaining...
David Olivieri, Juan Fco. Gálvez Gál...
CIKM
2009
Springer
15 years 2 months ago
Scalable continuous range monitoring of moving objects in symbolic indoor space
Indoor spaces accommodate large populations of individuals. The continuous range monitoring of such objects can be used as a foundation for a wide variety of applications, e.g., s...
Bin Yang 0002, Hua Lu, Christian S. Jensen
NSF
2001
Springer
225views Computer Vision» more  NSF 2001»
15 years 2 months ago
Content-Based Networking: A New Communication Infrastructure
Abstract. We argue that the needs of many classes of modern applications, especially those targeted at mobile or wireless computing, demand the services of content-based publish/su...
Antonio Carzaniga, Alexander L. Wolf
SIGCOMM
2009
ACM
15 years 4 months ago
Resonance: dynamic access control for enterprise networks
Enterprise network security is typically reactive, and it relies heavily on host security and middleboxes. This approach creates complicated interactions between protocols and sys...
Ankur Kumar Nayak, Alex Reimers, Nick Feamster, Ru...
CCS
2008
ACM
15 years 2 days ago
Code injection attacks on harvard-architecture devices
Harvard architecture CPU design is common in the embedded world. Examples of Harvard-based architecture devices are the Mica family of wireless sensors. Mica motes have limited me...
Aurélien Francillon, Claude Castelluccia