Sciweavers

1575 search results - page 139 / 315
» Simultaneous Source Location
Sort
View
IH
2005
Springer
15 years 9 months ago
Self-validating Branch-Based Software Watermarking
Software protection is an area of active research in which a variety of techniques have been developed to address the issue. Examples of such techniques are software watermarking, ...
Ginger Myles, Hongxia Jin
CCECE
2009
IEEE
15 years 8 months ago
Capacity analysis of a decode-and-forward cooperative network under adaptive transmission
—This paper presents a capacity analysis of a decode-and-forward (DF) cooperative network with adaptive source transmission. Three different adaptive techniques are considered: (...
Prasanna Kalansuriya, Chintha Tellambura
115
Voted
ACSAC
2000
IEEE
15 years 8 months ago
Extending Java for Package based Access Control
This paper describes an extension of the Java language that provides “programmable security.” The approach augments the Java syntax with constructs for specifying various acce...
John Hale, Mauricio Papa, Oliver Bremer, Rodrigo C...
138
Voted
COMPCON
1994
IEEE
15 years 7 months ago
The Newton Operating System
The Newton MessagePad Personal Digital Assistant (PDA) is the first in a class of devices distinguished by their pen-based user interface, communications capability, small size, a...
Robert Welland, Greg Seitz, Lieh-Wuu Wang, Landon ...
130
Voted
ICWSM
2010
15 years 5 months ago
A Comparison of Information Seeking Using Search Engines and Social Networks
The Web has become an important information repository; often it is the first source a person turns to with an information need. One common way to search the Web is with a search ...
Meredith Ringel Morris, Jaime Teevan, Katrina Pano...