Sciweavers

149 search results - page 25 / 30
» Symbolic Modeling and Evaluation of Data Paths
Sort
View
USS
2010
14 years 7 months ago
Toward Automated Detection of Logic Vulnerabilities in Web Applications
Web applications are the most common way to make services and data available on the Internet. Unfortunately, with the increase in the number and complexity of these applications, ...
Viktoria Felmetsger, Ludovico Cavedon, Christopher...
MOBISYS
2004
ACM
15 years 9 months ago
Impact of Radio Irregularity on Wireless Sensor Networks
In this paper, we investigate the impact of radio irregularity on the communication performance in wireless sensor networks. Radio irregularity is a common phenomenon which arises...
Gang Zhou, Tian He, Sudha Krishnamurthy, John A. S...
CCS
2008
ACM
14 years 11 months ago
Assessing query privileges via safe and efficient permission composition
We propose an approach for the selective enforcement of access control restrictions in, possibly distributed, large data collections based on two basic concepts: i) flexible autho...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
91
Voted
ICC
2007
IEEE
121views Communications» more  ICC 2007»
15 years 4 months ago
Global Control Plane Architecture for Cognitive Radio Networks
— This paper presents an architecture for adaptive cognitive radio networks based on the concept of a “global control plane”. The proposed control architecture uses a predete...
Xiangpeng Jing, Dipankar Raychaudhuri
ROMAN
2007
IEEE
156views Robotics» more  ROMAN 2007»
15 years 3 months ago
Development and User Testing of the Gestural Joystick for Gloves-On Hazardous Environments
— For controlling robots in an urban search and rescue (USAR) application, we present a wearable joystick with improved sensing capability as well as Giant MagnetoResistance(GMR)...
Jaewook Bae, Amy C. Larson, Richard M. Voyles, Roy...