Sciweavers

224 search results - page 39 / 45
» An Information Flow Verifier for Small Embedded Systems
Sort
View
ICMCS
2007
IEEE
136views Multimedia» more  ICMCS 2007»
14 years 1 months ago
An Image Secret Sharing Scheme with the Capability of Previvewing the Secret Image
Some (k, n)-threshold image secret sharing schemes encrypt the secret image into n noise-like shadow images with size 1/k times that of the original secret image. The small size o...
Ching-Nung Yang, Tse-Shih Chen
WWW
2008
ACM
14 years 8 months ago
The seamless browser: enhancing the speed of web browsing by zooming and preview thumbnails
In this paper, we present a new web browsing system, Seamless Browser, for fast link traversal on a large screen like TV In navigating web, users mainly suffer from cognitive over...
ByungIn Yoo, JongHo Lea, YeunBae Kim
LCTRTS
2004
Springer
14 years 26 days ago
A trace-based binary compilation framework for energy-aware computing
Energy-aware compilers are becoming increasingly important for embedded systems due to the need to meet conflicting constraints on time, code size and power consumption. We intro...
Lian Li 0002, Jingling Xue
ICISS
2010
Springer
13 years 5 months ago
ValueGuard: Protection of Native Applications against Data-Only Buffer Overflows
Abstract. Code injection attacks that target the control-data of an application have been prevalent amongst exploit writers for over 20 years. Today however, these attacks are gett...
Steven Van Acker, Nick Nikiforakis, Pieter Philipp...
RTAS
2005
IEEE
14 years 1 months ago
Optimal Time-Variant Resource Allocation for Internet Servers with Delay
The increasing popularity of high-volume performancecritical Internet applications calls for a scalable server design that allows meeting individual response-time guarantees. Cons...
Xiliang Zhong, Cheng-Zhong Xu, Minghua Xu, Jianbin...