Sciweavers

2363 search results - page 331 / 473
» How Secure is RFID
Sort
View
149
Voted
GRID
2000
Springer
15 years 8 months ago
Data Management in an International Data Grid Project
Abstract. In this paper we report on preliminary work and architectural design carried out in the "Data Management" work package in the International Data Grid project. O...
Wolfgang Hoschek, Francisco Javier Jaén-Mar...
129
Voted
OOPSLA
2000
Springer
15 years 8 months ago
Application isolation in the JavaTM Virtual Machine
To date, systems offering multitasking for the JavaTM programming language either use one process or one class loader for each application. Both approaches are unsatisfactory. Usi...
Grzegorz Czajkowski
OOPSLA
1987
Springer
15 years 8 months ago
Metaclasses are First Class: the ObjVlisp Model
This paper shows how an attempt at a uniform and reflective definition resulted in an open-ended system supporting ObjVlisp, which we use to simulate object-oriented language exte...
Pierre Cointe
USS
2008
15 years 7 months ago
You Go to Elections with the Voting System You Have: Stop-Gap Mitigations for Deployed Voting Systems
In light of the systemic vulnerabilities uncovered by recent reviews of deployed e-voting systems, the surest way to secure the voting process would be to scrap the existing syste...
J. Alex Halderman, Eric Rescorla, Hovav Shacham, D...
ACSAC
2008
IEEE
15 years 7 months ago
Practical Applications of Bloom Filters to the NIST RDS and Hard Drive Triage
Much effort has been expended in recent years to create large sets of hash codes from known files. Distributing these sets has become more difficult as these sets grow larger. Mea...
Paul F. Farrell Jr., Simson L. Garfinkel, Douglas ...