Sciweavers

416 search results - page 71 / 84
» Some new approaches for preventing software tampering
Sort
View
MATA
2004
Springer
149views Communications» more  MATA 2004»
15 years 4 months ago
Detecting and Proving Manipulation Attacks in Mobile Agent Systems
Mobile agents are software entities consisting of code, data and state that can migrate autonomously from host to host executing their code. Unfortunately, security issues restrict...
Oscar Esparza, Miguel Soriano, Jose L. Muño...
COSIT
2003
Springer
145views GIS» more  COSIT 2003»
15 years 4 months ago
Extracting Landmarks with Data Mining Methods
Abstract. The navigation task is a very demanding application for mobile users. The algorithms of present software solutions are based on the established methods of car navigation ...
Birgit Elias
ER
2007
Springer
102views Database» more  ER 2007»
15 years 3 months ago
Relational Data Tailoring Through View Composition
This paper presents a methodology to derive views over a relational database by applying a sequence of appropriately defined operations to the global schema. Such tailoring and com...
Cristiana Bolchini, Elisa Quintarelli, Rosalba Ros...
APCSAC
2001
IEEE
15 years 3 months ago
Stacking them up: a Comparison of Virtual Machines
A popular trend in current software technology is to gain program portability by compiling programs to an inte form based on an abstract machine definition. Such approaches date b...
K. John Gough
FC
1997
Springer
107views Cryptology» more  FC 1997»
15 years 3 months ago
An Efficient Micropayment System Based on Probabilistic Polling
Existing software proposals for electronic payments can be divided into "on-line" schemes that require participation of a trusted party (the bank) in every transaction an...
Stanislaw Jarecki, Andrew M. Odlyzko