Sciweavers

1843 search results - page 49 / 369
» Securing Class Initialization
Sort
View
CCS
2008
ACM
15 years 4 months ago
Secure neighbor discovery in wireless networks: formal investigation of possibility
Wireless communication enables a broad spectrum of applications, ranging from commodity to tactical systems. Neighbor discovery (ND), that is, determining which devices are within...
Marcin Poturalski, Panos Papadimitratos, Jean-Pier...
TIT
2008
106views more  TIT 2008»
15 years 2 months ago
Some Results on FCSR Automata With Applications to the Security of FCSR-Based Pseudorandom Generators
This article describes new theoretical results concerning the general behavior of a Feedback with Carry Shift Register (FCSR) automaton. They help to better understand how the init...
François Arnault, Thierry P. Berger, Marine...
SAC
2002
ACM
15 years 2 months ago
Secure mobile agent systems using Java: where are we heading?
Java is the predominant language for mobile agent systems, both for implementing mobile agent execution environments and for writing mobile agent applications. This is due to inhe...
Walter Binder, Volker Roth
IDEAL
2004
Springer
15 years 7 months ago
Learning to Classify Biomedical Terms Through Literature Mining and Genetic Algorithms.
We present an approach to classification of biomedical terms based on the information acquired automatically from the corpus of relevant literature. The learning phase consists of...
Irena Spasic, Goran Nenadic, Sophia Ananiadou
METRICS
1997
IEEE
15 years 6 months ago
Inheritance Tree Shapes and Reuse
The shapes of forests of inheritance trees can affect the amount of code reuse in an object-oriented system. Designers can benefit from knowing how structuring decisions affect r...
Byung-Kyoo Kang, James M. Bieman