Sciweavers

12052 search results - page 2111 / 2411
» computer 2010
Sort
View
96
Voted
CC
2010
Springer
118views System Software» more  CC 2010»
14 years 11 months ago
Unrestricted Code Motion: A Program Representation and Transformation Algorithms Based on Future Values
Abstract. We introduce the concept of future values. Using future values it is possible to represent programs in a new control-flow form such that on any control flow path the data...
Shuhan Ding, Soner Önder
CORR
2010
Springer
126views Education» more  CORR 2010»
14 years 11 months ago
Triangular Self-Assembly
We discuss the self-assembly system of triangular tiles instead of square tiles, in particular right triangular tiles and equilateral triangular tiles. We show that the triangular...
Lila Kari, Shinnosuke Seki, Zhi Xu
121
Voted
CORR
2010
Springer
152views Education» more  CORR 2010»
14 years 11 months ago
A new key establishment scheme for wireless sensor networks
Traditional key management techniques, such as public key cryptography or key distribution center (e.g., Kerberos), are often not effective for wireless sensor networks for the se...
Eric Ke Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu
121
Voted
ACSAC
2010
IEEE
14 years 10 months ago
Analyzing and improving Linux kernel memory protection: a model checking approach
Code injection continues to pose a serious threat to computer systems. Among existing solutions, W X is a notable approach to prevent the execution of injected code. In this paper...
Siarhei Liakh, Michael C. Grace, Xuxian Jiang
112
Voted
ACSAC
2010
IEEE
14 years 10 months ago
A multi-user steganographic file system on untrusted shared storage
Existing steganographic file systems enable a user to hide the existence of his secret data by claiming that they are (static) dummy data created during disk initialization. Such ...
Jin Han, Meng Pan, Debin Gao, HweeHwa Pang
« Prev « First page 2111 / 2411 Last » Next »