Sciweavers

2940 search results - page 426 / 588
» Relational Parametricity and Control
Sort
View
PET
2007
Springer
15 years 4 months ago
Browser-Based Attacks on Tor
This paper describes a new attack on the anonymity of web browsing with Tor. The attack tricks a user’s web browser into sending a distinctive signal over the Tor network that ca...
Timothy G. Abbott, Katherine J. Lai, Michael R. Li...
WER
2007
Springer
15 years 4 months ago
O Gerenciamento de Requisitos no Ambiente COCAR
Background. This research group has been working towards building an environment which helps software development, providing support to some activities mainly based on use case mo...
André Di Thommazo, Marcos Danilo Martins, S...
ACSC
2006
IEEE
15 years 4 months ago
Manufacturing opaque predicates in distributed systems for code obfuscation
Code obfuscation is a relatively new technique of software protection and it works by deterring reverse engineering attempts by malicious users of software. The objective of obfus...
Anirban Majumdar, Clark D. Thomborson
GLOBECOM
2006
IEEE
15 years 4 months ago
Mobility Modeling and Handoff Analysis for IP/MPLS-Based Cellular Networks
Abstract— One of the major challenges for the wireless networks is related to efficient mobility management issue. In this paper, we propose a new micro-mobility management sche...
Rami Langar, Nizar Bouabdallah, Samir Tohmé...
90
Voted
ICAT
2006
IEEE
15 years 4 months ago
An Animation System for Imitation of Object Grasping in Virtual Reality
Interactive virtual characters are nowadays commonplace in games, animations, and Virtual Reality (VR) applications. However, relatively few work has so far considered the animatio...
Matthias Weber, Guido Heumer, Heni Ben Amor, Bernh...