Sciweavers

1147 search results - page 137 / 230
» Termination in language-based systems
Sort
View
EURONGI
2005
Springer
15 years 6 months ago
P2P-Based Mobility Management for Heterogeneous Wireless Networks and Mesh Networks
Abstract. The recent emergence of a whole plethora of new wireless technologies, such as IEEE802.15, IEEE802.11, and UMTS, etc, has exposed the limitations of mobility solutions in...
Amine M. Houyou, Hermann de Meer, Moritz Esterhazy
86
Voted
RTA
2005
Springer
15 years 6 months ago
Open. Closed. Open
Abstract. As a window into the subject, we recount some of the history (and geography) of two mature, challenging, partially open, partially closed problems in the theory of rewrit...
Nachum Dershowitz
107
Voted
SAC
2004
ACM
15 years 6 months ago
Protected transmission of biometric user authentication data for oncard-matching
Since fingerprint data are no secrets but of public nature, the verification data transmitted to a smartcard for oncardmatching need protection by appropriate means in order to ...
Ulrich Waldmann, Dirk Scheuermann, Claudia Eckert
ACNS
2004
Springer
284views Cryptology» more  ACNS 2004»
15 years 6 months ago
SQLrand: Preventing SQL Injection Attacks
We present a practical protection mechanism against SQL injection attacks. Such attacks target databases that are accessible through a web frontend, and take advantage of flaws in...
Stephen W. Boyd, Angelos D. Keromytis
89
Voted
AISC
2004
Springer
15 years 6 months ago
Solving Equations Involving Sequence Variables and Sequence Functions
Term equations involving individual and sequence variables and sequence function symbols are studied. Function symbols can have either fixed or flexible arity. A sequence variabl...
Temur Kutsia