Sciweavers

286 search results - page 21 / 58
» Crypto Engineering: Some History and Some Case Studies
Sort
View
SECON
2008
IEEE
14 years 2 months ago
UDAE: Universal Data Access Engine for Sensor Networks
—We present the design and implementation of UDAE, a Universal Data Access Engine for wireless sensor networks. The UDAE allows developers to access data both locally and over th...
Krisakorn Rerkrai, Janne Riihijärvi, Petri M&...
SEMWIKI
2008
156views Data Mining» more  SEMWIKI 2008»
13 years 9 months ago
A Generic Corporate Ontology Lifecycle
Abstract. Weaving the Semantic Web the research community is working on publishing publicly available data sources as RDF data on the Web. To facilitate the adoption of Semantic We...
Markus Luczak-Rösch, Ralf Heese
SIGSOFT
2004
ACM
14 years 8 months ago
Making embedded software reuse practical and safe
Reuse of application software has been limited and sometimes has led to accidents. This paper suggests some requirements for successful and safe application software reuse and dem...
Nancy G. Leveson, Kathryn Anne Weiss
IWPC
2006
IEEE
14 years 1 months ago
Understanding Obfuscated Code
Code obfuscation makes it harder for a security analyst to understand the malicious payload of a program. In most cases an analyst needs to study the program at the machine code l...
Matias Madou, Ludo Van Put, Koen De Bosschere
FSTTCS
1999
Springer
13 years 12 months ago
Explicit Substitutions and Programming Languages
The λ-calculus has been much used to study the theory of substitution in logical systems and programming languages. However, with explicit substitutions, it is possible to get fi...
Jean-Jacques Lévy, Luc Maranget