Sciweavers

327 search results - page 47 / 66
» Access and Use Control using Externally Controlled Reference...
Sort
View
CSFW
2011
IEEE
12 years 10 months ago
Local Memory via Layout Randomization
—Randomization is used in computer security as a tool to introduce unpredictability into the software infrastructure. In this paper, we study the use of randomization to achieve ...
Radha Jagadeesan, Corin Pitcher, Julian Rathke, Ja...
COST
1994
Springer
159views Multimedia» more  COST 1994»
14 years 2 months ago
A Mail-Based Teleservice Architecture for Archiving and Retrieving Dynamically Composable Multimedia Documents
In this paper, a teleservice for archiving and retrieving multimedia documents using public networks is described. This teleservice encourages a broad range of commercially applic...
Heiko Thimm, Katja Röhr, Thomas C. Rakow
CRISIS
2009
13 years 8 months ago
A secured delegation of remote services on IPv6 home networks
IPv6 is an attractive technology for innovative services such as health care monitoring, alarm systems, peer to peer applications, virtual machine systems and so on. The generaliza...
Stere Preda, Laurent Toutain, Nora Cuppens-Boulahi...
MOBIQUITOUS
2007
IEEE
14 years 4 months ago
A Low-delay Protocol for Multihop Wireless Body Area Networks
—Wireless Body Area Networks (WBANs) form a new and interesting area in the world of remote health monitoring. An important concern in such networks is the communication between ...
Benoît Latré, Bart Braem, Ingrid Moer...
DATE
2008
IEEE
165views Hardware» more  DATE 2008»
14 years 4 months ago
TinyTimber, Reactive Objects in C for Real-Time Embedded Systems
Embedded systems are often operating under hard real-time constraints. Such systems are naturally described as time-bound reactions to external events, a point of view made manife...
Per Lindgren, Johan Eriksson, Simon Aittamaa, Joha...