Sciweavers

206 search results - page 24 / 42
» Generalized Secure Distributed Source Coding with Side Infor...
Sort
View
63
Voted
WWW
2007
ACM
15 years 10 months ago
Subspace: secure cross-domain communication for web mashups
Combining data and code from third-party sources has enabled a new wave of web mashups that add creativity and functionality to web applications. However, browsers are poorly desi...
Collin Jackson, Helen J. Wang
83
Voted
ICSE
2004
IEEE-ACM
15 years 9 months ago
Unifying Artifacts and Activities in a Visual Tool for Distributed Software Development Teams
In large projects, software developers struggle with two sources of complexity ? the complexity of the code itself, and the complexity of the process of producing it. Both of thes...
Jon Froehlich, Paul Dourish
SAC
2010
ACM
14 years 9 months ago
Graph-based verification of static program constraints
Software artifacts usually have static program constraints and these constraints should be satisfied in each reuse. In addition to this, the developers are also required to satisf...
Selim Ciraci, Pim van den Broek, Mehmet Aksit
CORR
2010
Springer
144views Education» more  CORR 2010»
14 years 9 months ago
Secure Transmission with Multiple Antennas II: The MIMOME Wiretap Channel
The capacity of the Gaussian wiretap channel model is analyzed when there are multiple antennas at the sender, intended receiver and eavesdropper. The associated channel matrices a...
Ashish Khisti, Gregory W. Wornell
CCS
2007
ACM
15 years 3 months ago
Panorama: capturing system-wide information flow for malware detection and analysis
Malicious programs spy on users’ behavior and compromise their privacy. Even software from reputable vendors, such as Google Desktop and Sony DRM media player, may perform undes...
Heng Yin, Dawn Xiaodong Song, Manuel Egele, Christ...