Sciweavers

533 search results - page 47 / 107
» Control flow based obfuscation
Sort
View
JNCA
2008
123views more  JNCA 2008»
15 years 2 months ago
Edge-limited scalable QoS flow set-up
Although the Differentiated Services architecture supports scalable packet forwarding based on aggregate flows, the detailed procedure of Quality of Service (QoS) flow set-up with...
James Lembke, Byung Kyu Choi
196
Voted
FCCM
2006
IEEE
133views VLSI» more  FCCM 2006»
15 years 8 months ago
A Field Programmable RFID Tag and Associated Design Flow
Current Radio Frequency Identification (RFID) systems generally have long design times and low tolerance to changes in specification. This paper describes a field programmable,...
Alex K. Jones, Raymond R. Hoare, Swapna R. Donthar...
139
Voted
SOCIALCOM
2010
15 years 11 days ago
OSNAC: An Ontology-based Access Control Model for Social Networking Systems
Abstract--As the information flowing around in social networking systems is mainly related or can be attributed to their users, controlling access to such information by individual...
Amirreza Masoumzadeh, James B. D. Joshi
PLDI
2009
ACM
15 years 7 months ago
Flow-sensitive semantics for dynamic information flow policies
Dynamic information flow policies, such as declassification, are essential for practically useful information flow control systems. However, most systems proposed to date that ...
Niklas Broberg, David Sands
TASE
2008
IEEE
15 years 2 months ago
Vision-Based Online Process Control in Manufacturing Applications
Applications such as layered manufacturing, or in general, solid free-form fabrication, pose a major challenge on online process control. For these parts to be functional, it is i...
Yuan Cheng, Mohsen A. Jafari