Sciweavers

12493 search results - page 2263 / 2499
» Information Access in the Web
Sort
View
ACMICEC
2007
ACM
163views ECommerce» more  ACMICEC 2007»
15 years 5 months ago
Digital rights management using a mobile phone
This paper focuses on the problem of preventing illegal copying of digital assets without jeopardising the right of legitimate licence holders to transfer content between their ow...
Imad M. Abbadi, Chris J. Mitchell
129
Voted
CAV
2007
Springer
111views Hardware» more  CAV 2007»
15 years 5 months ago
Verification Across Intellectual Property Boundaries
In many industries, the share of software components provided by third-party suppliers is steadily increasing. As the suppliers seek to secure their intellectual property (IP) righ...
Sagar Chaki, Christian Schallhart, Helmut Veith
CAV
2010
Springer
161views Hardware» more  CAV 2010»
15 years 5 months ago
Directed Proof Generation for Machine Code
We present the algorithms used in MCVETO (Machine-Code VErification TOol), a tool to check whether a stripped machinecode program satisfies a safety property. The verification p...
Aditya V. Thakur, Junghee Lim, Akash Lal, Amanda B...
111
Voted
WCNC
2010
IEEE
15 years 5 months ago
A Lightweight Distributed Solution to Content Replication in Mobile Networks
Abstract—Performance and reliability of content access in mobile networks is conditioned jointly by the number and location of content replicas deployed at the network nodes. The...
C.-A. La, Pietro Michiardi, Claudio Casetti, Carla...
GLOBECOM
2009
IEEE
15 years 5 months ago
Bargaining to Improve Channel Sharing between Selfish Cognitive Radios
We consider a problem where two selfish cognitive radio users try to share two channels on which they each have potentially different valuations. We first formulate the problem as ...
Hua Liu, Allen B. MacKenzie, Bhaskar Krishnamachar...
« Prev « First page 2263 / 2499 Last » Next »