Sciweavers

364 search results - page 49 / 73
» E-Voting System Security Optimization
Sort
View
DATE
2004
IEEE
136views Hardware» more  DATE 2004»
13 years 11 months ago
Compact Binaries with Code Compression in a Software Dynamic Translator
Embedded software is becoming more flexible and adaptable, which presents new challenges for management of highly constrained system resources. Software dynamic translation is a t...
Stacey Shogan, Bruce R. Childers
OOPSLA
2007
Springer
14 years 1 months ago
Using hpm-sampling to drive dynamic compilation
All high-performance production JVMs employ an adaptive strategy for program execution. Methods are first executed unoptimized and then an online profiling mechanism is used to ...
Dries Buytaert, Andy Georges, Michael Hind, Matthe...
INFOCOM
2010
IEEE
13 years 5 months ago
Maximum Damage Malware Attack in Mobile Wireless Networks
—Malware attacks constitute a serious security risk that threatens to slow down the large scale proliferation of wireless applications. As a first step towards thwarting this se...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman
IJITN
2010
177views more  IJITN 2010»
13 years 4 months ago
Real-Time Query Processing on Live Videos in Networks of Distributed Cameras
With the proliferation of inexpensive cameras and the availability of high-speed wired and wireless networks, systems of distributed cameras are becoming an enabling technology fo...
Rui Peng, Alexander J. Aved, Kien A. Hua
ASPLOS
2000
ACM
13 years 11 months ago
Architectural Support for Fast Symmetric-Key Cryptography
The emergence of the Internet as a trusted medium for commerce and communication has made cryptography an essential component of modern information systems. Cryptography provides ...
Jerome Burke, John McDonald, Todd M. Austin