Sciweavers

410 search results - page 33 / 82
» Software Protection with Code Mobility
Sort
View
SOQUA
2004
14 years 12 months ago
Safety Assessment of Systems Embedded with COTS Components by PIP technique
: The difficulties to assess reliability of systems that use COTS components are sometimes compounded by the inaccessibility of some COTS codes. This paper develops an approach of ...
Luping Chen, John H. R. May
CODES
2008
IEEE
15 years 5 months ago
Holistic design and caching in mobile computing
We utilize application trends analysis, focused on webpage content, in order to examine the design of mobile computers more holistically. We find that both Internet bandwidth and ...
Mwaffaq Otoom, JoAnn M. Paul
ECOOP
2007
Springer
15 years 2 months ago
Product Line Variability Refactoring Tool
With the growing academic and industrial interest in Software Product Lines (SPL), one area demanding special attention is tool support development, which is a pre-requisite for w...
Fernando Calheiros, Vilmar Nepomuceno, Paulo Borba...
JVCIR
2006
163views more  JVCIR 2006»
14 years 10 months ago
Layered H.264 video transmission with hierarchical QAM
In multimedia communication systems, channel bandwidth and probability of error are the two main limitations that affect the quality of service. Therefore, in applications such as...
Mohammad Mahdi Ghandi, Mohammed Ghanbari
DSN
2007
IEEE
15 years 4 months ago
An Architectural Approach to Preventing Code Injection Attacks
Code injection attacks, despite being well researched, continue to be a problem today. Modern architectural solutions such as the NX-bit and PaX have been useful in limiting the a...
Ryan Riley, Xuxian Jiang, Dongyan Xu