Sciweavers

1129 search results - page 165 / 226
» Providing Transparent Security Services to Sensor Networks
Sort
View
ACSAC
2010
IEEE
14 years 8 months ago
Cujo: efficient detection and prevention of drive-by-download attacks
The JavaScript language is a core component of active and dynamic web content in the Internet today. Besides its great success in enhancing web applications, however, JavaScript p...
Konrad Rieck, Tammo Krueger, Andreas Dewald
SOSP
2005
ACM
15 years 6 months ago
THINC: a virtual display architecture for thin-client computing
Rapid improvements in network bandwidth, cost, and ubiquity combined with the security hazards and high total cost of ownership of personal computers have created a growing market...
Ricardo A. Baratto, Leonard N. Kim, Jason Nieh
ICALT
2006
IEEE
15 years 3 months ago
Instruction Through The Ages: Building Pervasive Virtual Instructors for Life Long Learning
A pervasive virtual instructor is an artificially intelligent instructor that may appear transparent to the learner or appear in the form of a threedimensional graphical character...
Jayfus T. Doswell
RTAS
2003
IEEE
15 years 3 months ago
Feedback Control Real-Time Scheduling in ORB Middleware
Existing real-time ORB middleware standards such as RT-CORBA do not adequately address the challenges of 1) providing robust performance guarantees portably across different platf...
Chenyang Lu, Xiaorui Wang, Christopher D. Gill
ITCC
2005
IEEE
15 years 3 months ago
A Framework for Key Management in Mobile Ad Hoc Networks
Background: Key management in a mobile ad hoc environment is complicated by frequently partitioning network topology. Recently proposed key management systems (KMSs) provide limit...
George C. Hadjichristofi, William Joseph Adams, Na...