Sciweavers

3420 search results - page 538 / 684
» A Language-Based Approach to Security
Sort
View
JCM
2007
114views more  JCM 2007»
13 years 10 months ago
Tunable Pulse Amplitude and Position Modulation Technique for Reliable Optical Wireless Communication Channels
—Modulation techniques have attracted increasing attention in optical wireless communications. Basic schemes such as on off keying (OOK), pulse amplitude modulation (PAM) and pul...
Yu Zeng, Roger J. Green, Shaobo Sun, Mark S. Leeso...
JLP
2007
74views more  JLP 2007»
13 years 10 months ago
Linearity and bisimulation
Exploiting linear type structure, we introduce a new theory bisimilarity for the π-calculus in which we abstract away not only τ-actions but also non-τ actions which do not aff...
Nobuko Yoshida, Kohei Honda, Martin Berger
AIR
2004
98views more  AIR 2004»
13 years 10 months ago
Further Experiments on Collaborative Ranking in Community-Based Web Search
As the search engine arms-race continues, search engines are constantly looking for ways to improve the manner in which they respond to user queries. Given the vagueness of Web sea...
Jill Freyne, Barry Smyth, Maurice Coyle, Evelyn Ba...
VIROLOGY
2008
95views more  VIROLOGY 2008»
13 years 10 months ago
On JavaScript Malware and related threats
The term JavaScript Malware describes attacks that abuse the web browser's capabilities to execute malicious script-code within the victim's local execution context. Unli...
Martin Johns
JWSR
2007
129views more  JWSR 2007»
13 years 10 months ago
Extensible Architecture for High-Performance, Scalable, Reliable Publish-Subscribe Eventing and Notification
Existing Web service notification and eventing standards are useful in many applications, but they have serious limitations that make them ill-suited for large-scale deployments, ...
Krzysztof Ostrowski, Ken Birman, Danny Dolev