Sciweavers

3483 search results - page 678 / 697
» Using Subject-Oriented Modeling to Develop Jini Applications
Sort
View
ECOOP
2005
Springer
15 years 6 months ago
Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection
In Java 2 and Microsoft .NET Common Language Runtime (CLR), trusted code has often been programmed to perform accessrestricted operations not explicitly requested by its untrusted ...
Marco Pistoia, Robert J. Flynn, Larry Koved, Vugra...
87
Voted
ICALP
2005
Springer
15 years 6 months ago
On the Wake-Up Problem in Radio Networks
Abstract. Radio networks model wireless communication when processing units communicate using one wave frequency. This is captured by the property that multiple messages arriving s...
Bogdan S. Chlebus, Leszek Gasieniec, Dariusz R. Ko...
104
Voted
SASN
2003
ACM
15 years 5 months ago
Location-based pairwise key establishments for static sensor networks
Sensor networks are ideal candidates for applications such as target tracking and environment monitoring. Security in sensor networks is critical when there are potential adversar...
Donggang Liu, Peng Ning
PE
2002
Springer
158views Optimization» more  PE 2002»
15 years 3 days ago
Comparison of inter-area rekeying algorithms for secure wireless group communications
Many emerging mobile wireless applications depend upon secure group communications, in which data is encrypted and the group's data encryption key is changed whenever a membe...
Chun Zhang, Brian DeCleene, James F. Kurose, Donal...
115
Voted
CVPR
2008
IEEE
16 years 2 months ago
Sketching in the air: A vision-based system for 3D object design
3D object design has many applications including flexible 3D sketch input in CAD, computer game, webpage content design, image based object modeling, and 3D object retrieval. Most...
Yu Chen, Jianzhuang Liu, Xiaoou Tang