Sciweavers

516 search results - page 36 / 104
» Comparing Two Information Flow Security Properties
Sort
View
CCS
2009
ACM
14 years 3 months ago
NISAN: network information service for anonymization networks
Network information distribution is a fundamental service for any anonymization network. Even though anonymization and information distribution about the network are two orthogona...
Andriy Panchenko, Stefan Richter, Arne Rache
DRM
2005
Springer
14 years 2 months ago
Control flow based obfuscation
A software obfuscator is a program O to transform a source program P for protection against malicious reverse engineering. O should be correct (O(P) has same functionality with P)...
Jun Ge, Soma Chaudhuri, Akhilesh Tyagi
BROADNETS
2004
IEEE
14 years 17 days ago
Determining Intra-Flow Contention along Multihop Paths in Wireless Networks
Admission control of flows is essential for providing quality of service in multihop wireless networks. In order to make an admission decision for a new flow, the expected bandwid...
Kimaya Sanzgiri, Ian D. Chakeres, Elizabeth M. Bel...
PAMI
2007
219views more  PAMI 2007»
13 years 8 months ago
Shape Estimation Using Polarization and Shading from Two Views
—This paper presents a novel method for 3D surface reconstruction that uses polarization and shading information from two views. The method relies on the polarization data acquir...
Gary Atkinson, Edwin R. Hancock
VEE
2012
ACM
252views Virtualization» more  VEE 2012»
12 years 4 months ago
libdft: practical dynamic data flow tracking for commodity systems
Dynamic data flow tracking (DFT) deals with tagging and tracking data of interest as they propagate during program execution. DFT has been repeatedly implemented by a variety of ...
Vasileios P. Kemerlis, Georgios Portokalidis, Kang...