Sciweavers

11547 search results - page 2299 / 2310
» Quantum computing and communication
Sort
View
WDAG
2010
Springer
196views Algorithms» more  WDAG 2010»
15 years 6 days ago
Brief Announcement: Failure Detectors Encapsulate Fairness
Abstract. We argue that failure detectors encapsulate fairness. Fairness is a measure of the number of steps a process takes relative to another processes and/or messages in transi...
Scott M. Pike, Srikanth Sastry, Jennifer L. Welch
ACSAC
2010
IEEE
14 years 12 months ago
Cujo: efficient detection and prevention of drive-by-download attacks
The JavaScript language is a core component of active and dynamic web content in the Internet today. Besides its great success in enhancing web applications, however, JavaScript p...
Konrad Rieck, Tammo Krueger, Andreas Dewald
ACSAC
2010
IEEE
14 years 12 months ago
Porscha: policy oriented secure content handling in Android
The penetration of cellular networks worldwide and emergence of smart phones has led to a revolution in mobile content. Users consume diverse content when, for example, exchanging...
Machigar Ongtang, Kevin R. B. Butler, Patrick Drew...
178
Voted
AUGHUMAN
2010
14 years 12 months ago
Aided eyes: eye activity sensing for daily life
Our eyes collect a considerable amount of information when we use them to look at objects. In particular, eye movement allows us to gaze at an object and shows our level of intere...
Yoshio Ishiguro, Adiyan Mujibiya, Takashi Miyaki, ...
123
Voted
CASES
2010
ACM
14 years 12 months ago
Low cost multicast authentication via validity voting in time-triggered embedded control networks
Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
Christopher Szilagyi, Philip Koopman
« Prev « First page 2299 / 2310 Last » Next »