Sciweavers

410 search results - page 62 / 82
» Software Protection with Code Mobility
Sort
View
KI
2008
Springer
14 years 10 months ago
Translating Cooperative Strategies for Robot Behavior
Abstract. This paper presents a method for engineering and programming multirobot systems, based on a combination of statecharts and hybrid automata, which are well-known in the fi...
Florian Ruh, Frieder Stolzenburg
ICPPW
2000
IEEE
15 years 2 months ago
Flits: Pervasive Computing for Processor and Memory Constrained Systems
Many pervasive computing software technologies are targeted for 32-bit desktop platforms. However, there are innumerable 8, 16, and 32-bit microcontroller and microprocessor-based...
William Majurski, Alden Dima, Mary Laamanen
MOBISYS
2008
ACM
15 years 10 months ago
Trustworthy and personalized computing on public kiosks
Many people desire ubiquitous access to their personal computing environments. We present a system in which a user leverages a personal mobile device to establish trust in a publi...
Scott Garriss, Ramón Cáceres, Stefan...
EUROSYS
2008
ACM
15 years 7 months ago
Flicker: an execution infrastructure for tcb minimization
We present Flicker, an infrastructure for executing securitysensitive code in complete isolation while trusting as few as 250 lines of additional code. Flicker can also provide me...
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Mi...
CCS
2003
ACM
15 years 3 months ago
MECA: an extensible, expressive system and language for statically checking security properties
This paper describes a system and annotation language, MECA, for checking security rules. MECA is expressive and designed for checking real systems. It provides a variety of pract...
Junfeng Yang, Ted Kremenek, Yichen Xie, Dawson R. ...