Sciweavers

446 search results - page 74 / 90
» A Study of Dead Data Members in C Applications
Sort
View
ICC
2009
IEEE
162views Communications» more  ICC 2009»
14 years 3 months ago
CLACK: A Network Covert Channel Based on Partial Acknowledgment Encoding
—The ability of setting up a covert channel, which allows any two nodes with Internet connections to engage in secretive communication, clearly causes a very serious security con...
Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang
ICDIM
2009
IEEE
14 years 3 months ago
Augmenting the exploration of digital libraries with web-based visualizations
Web-based digital libraries have sped up the process that scholars use to find new, important research papers. Unfortunately, current digital libraries are limited by their inade...
Peter Bergstrom, Darren C. Atkinson
AINA
2008
IEEE
14 years 3 months ago
A Proposed Scheme for Epidemic Routing with Active Curing for Opportunistic Networks
Opportunistic networking is emerging as a technique to exploit chance encounters among mobile nodes, and is distinct from previously studied behaviors found in sensor and ad hoc n...
Jonah P. Tower, Thomas D. C. Little
CSMR
2007
IEEE
14 years 3 months ago
Online Construction of Dynamic Object Process Graphs
A dynamic object process graph is a view on the control flow graph from the perspective of a single object. It has been shown that such a graph can be a useful starting point for...
Jochen Quante
CCS
2007
ACM
14 years 3 months ago
Provably secure ciphertext policy ABE
In ciphertext policy attribute-based encryption (CP-ABE), every secret key is associated with a set of attributes, and every ciphertext is associated with an access structure on a...
Ling Cheung, Calvin C. Newport