Sciweavers

2500 search results - page 356 / 500
» Specifying Behavior in C
Sort
View
160
Voted
ESORICS
2002
Springer
16 years 3 months ago
TINMAN: A Resource Bound Security Checking System for Mobile Code
Resource security pertains to the prevention of unauthorized usage of system resources that may not directly cause corruption or leakage of information. A common breach of resource...
Aloysius K. Mok, Weijiang Yu
143
Voted
MOBIHOC
2007
ACM
16 years 3 months ago
Outlier detection in sensor networks
Outlier detection has many important applications in sensor networks, e.g., abnormal event detection, animal behavior change, etc. It is a difficult problem since global informati...
Bo Sheng, Qun Li, Weizhen Mao, Wen Jin
116
Voted
MOBIHOC
2007
ACM
16 years 3 months ago
Secure incentives for commercial ad dissemination in vehicular networks
Vehicular ad hoc networks (VANETs) are envisioned to provide us with numerous interesting services in the near future. One of the most promising applications is the dissemination ...
Suk-Bok Lee, Gabriel Pan, Joon-Sang Park, Mario Ge...
141
Voted
MOBIHOC
2006
ACM
16 years 3 months ago
An evaluation of inter-vehicle ad hoc networks based on realistic vehicular traces
Vehicular ad hoc networks (VANETs) using WLAN technology have recently received considerable attention. The evaluation of VANET routing protocols often involves simulators since m...
Valery Naumov, Rainer Baumann, Thomas R. Gross
EUROSYS
2009
ACM
16 years 22 days ago
Tralfamadore: unifying source code and execution experience
Program source is an intermediate representation of software; it lies between a developer’s intention and the hardware’s execution. Despite advances in languages and developme...
Geoffrey Lefebvre, Brendan Cully, Michael J. Feele...