Sciweavers

323 search results - page 54 / 65
» Security Analysis of Mobile Java
Sort
View
RAID
2004
Springer
15 years 3 months ago
Attack Analysis and Detection for Ad Hoc Routing Protocols
Abstract. Attack analysis is a challenging problem, especially in emerging environments where there are few known attack cases. One such new environment is the Mobile Ad hoc Networ...
Yi-an Huang, Wenke Lee
ICDCS
2003
IEEE
15 years 2 months ago
Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies
With the proliferation of wireless devices, mobile ad hoc networking (MANET) has become a very exciting and important technology due to its characteristics of open medium and dyna...
Yi-an Huang, Wei Fan, Wenke Lee, Philip S. Yu
BMCBI
2010
132views more  BMCBI 2010»
14 years 9 months ago
Next generation tools for genomic data generation, distribution, and visualization
Background: With the rapidly falling cost and availability of high throughput sequencing and microarray technologies, the bottleneck for effectively using genomic analysis in the ...
David A. Nix, Tonya L. Di Sera, Brian K. Dalley, B...
TIC
2000
Springer
137views System Software» more  TIC 2000»
15 years 1 months ago
Scalable Certification for Typed Assembly Language
Abstract. A type-based certifying compiler maps source code to machine code and target-level type annotations. The target-level annotations make it possible to prove easily that th...
Dan Grossman, J. Gregory Morrisett
PERVASIVE
2007
Springer
15 years 3 months ago
Shake Well Before Use: Authentication Based on Accelerometer Data
Abstract. Small, mobile devices without user interfaces, such as Bluetooth headsets, often need to communicate securely over wireless networks. Active attacks can only be prevented...
Rene Mayrhofer, Hans Gellersen