Sciweavers

1054 search results - page 177 / 211
» From a Verified Kernel towards Verified Systems
Sort
View
ITIIS
2010
154views more  ITIIS 2010»
14 years 8 months ago
Research on Anti-Reader Collision Protocols for Integrated RFID-WSNs
Integrated RFID-WSNs (wireless sensor networks) have recently been researched to provide object identities, sensing information, mobile service, and network functionalities. In in...
Doohyun Ko, Bumjin Kim, Sunshin An
MOBISYS
2007
ACM
16 years 1 months ago
Accelerometer-based human abnormal movement detection in wireless sensor networks
Wireless sensor networks have become increasingly common in everyday applications due to decreasing technology costs and improved product reliability. An ideal application for wire...
T. Ryan Burchfield, S. Venkatesan
ICECCS
2009
IEEE
161views Hardware» more  ICECCS 2009»
15 years 8 months ago
Formal Modelling and Analysis of Business Information Applications with Fault Tolerant Middleware
Distributed information systems are critical to the functioning of many businesses; designing them to be dependable is a challenging but important task. We report our experience i...
Jeremy Bryans, John S. Fitzgerald, Alexander Roman...
ACSAC
2008
IEEE
15 years 8 months ago
XSSDS: Server-Side Detection of Cross-Site Scripting Attacks
Cross-site Scripting (XSS) has emerged to one of the most prevalent type of security vulnerabilities. While the reason for the vulnerability primarily lies on the serverside, the ...
Martin Johns, Björn Engelmann, Joachim Posegg...
IH
2004
Springer
15 years 7 months ago
An Asymmetric Security Mechanism for Navigation Signals
Abstract. Existing navigation services, such as GPS, offer no signalintegrity (anti-spoof) protection for the general public, especially not with systems for remote attestation of...
Markus G. Kuhn