Sciweavers

416 search results - page 49 / 84
» Some new approaches for preventing software tampering
Sort
View
AOSD
2005
ACM
15 years 6 months ago
An expressive aspect language for system applications with Arachne
C applications, in particular those using operating system level services, frequently comprise multiple crosscutting concerns: network protocols and security are typical examples ...
Rémi Douence, Thomas Fritz, Nicolas Loriant...
CCS
2005
ACM
15 years 6 months ago
Obfuscated databases and group privacy
We investigate whether it is possible to encrypt a database and then give it away in such a form that users can still access it, but only in a restricted way. In contrast to conve...
Arvind Narayanan, Vitaly Shmatikov
GPEM
2007
119views more  GPEM 2007»
15 years 1 months ago
Genomic mining for complex disease traits with "random chemistry"
Our rapidly growing knowledge regarding genetic variation in the human genome offers great potential for understanding the genetic etiology of disease. This, in turn, could revolut...
Margaret J. Eppstein, Joshua L. Payne, Bill C. Whi...
WOWMOM
2006
ACM
131views Multimedia» more  WOWMOM 2006»
15 years 7 months ago
Mobile Element Based Differentiated Message Delivery in Wireless Sensor Networks
In recent years, mobile elements (MEs) have been proposed as mechanical carriers of data to prolong the lifetime of sensor networks and to overcome network partitioning problem. A...
Yaoyao Gu, Doruk Bozdag, Eylem Ekici
ICSE
2009
IEEE-ACM
16 years 2 months ago
Listening to programmers - Taxonomies and characteristics of comments in operating system code
Innovations from multiple directions have been proposed to improve software reliability. Unfortunately, many of the innovations are not fully exploited by programmers. To bridge t...
Yoann Padioleau, Lin Tan, Yuanyuan Zhou