Sciweavers

1047 search results - page 206 / 210
» Implementing Scrum in a Distributed Software Development Org...
Sort
View
WWW
2010
ACM
15 years 4 months ago
Object views: fine-grained sharing in browsers
Browsers do not currently support the secure sharing of JavaScript objects between principals. We present this problem as the need for object views, which are consistent and contr...
Leo A. Meyerovich, Adrienne Porter Felt, Mark S. M...
ARTCOM
2009
IEEE
15 years 4 months ago
Load Balancing in Multi ECU Configuration
—Electronic Control Units (ECUs) are nowadays employed in automotives for discharging various functionalities within the vehicle. It has become the fundamental building block of ...
Rajeshwari Hegde, K. S. Gurumurthy
90
Voted
ISW
2009
Springer
15 years 4 months ago
Hardware-Assisted Application-Level Access Control
Abstract. Applications typically rely on the operating system to enforce access control policies such as MAC, DAC, or other policies. However, in the face of a compromised operatin...
Yu-Yuan Chen, Ruby B. Lee
102
Voted
CCS
2005
ACM
15 years 3 months ago
Automatic diagnosis and response to memory corruption vulnerabilities
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...
97
Voted
DCOSS
2005
Springer
15 years 3 months ago
jWebDust : A Java-Based Generic Application Environment for Wireless Sensor Networks
Abstract. Wireless sensor networks can be very useful in applications that require the detection of crucial events, in physical environments subjected to critical conditions, and t...
Ioannis Chatzigiannakis, Georgios Mylonas, Sotiris...