Sciweavers

1236 search results - page 81 / 248
» Efficient Interpretation Policies
Sort
View
ICECCS
2005
IEEE
236views Hardware» more  ICECCS 2005»
14 years 2 months ago
Detecting Malicious JavaScript Code in Mozilla
The JavaScript language is used to enhance the clientside display of web pages. JavaScript code is downloaded into browsers and executed on-the-fly by an embedded interpreter. Br...
Oystein Hallaraker, Giovanni Vigna
MOBIQUITOUS
2007
IEEE
14 years 3 months ago
Self-Managed Cell: A Middleware for Managing Body-Sensor Networks
Abstract— Body sensor networks consisting of low-power onbody wireless sensors attached to mobile users will be used in the future to monitor the health and well being of patient...
Sye Loong Keoh, Naranker Dulay, Emil Lupu, Kevin P...
CCS
2008
ACM
13 years 11 months ago
Privacy-safe network trace sharing via secure queries
Privacy concerns relating to sharing network traces have traditionally been handled via sanitization, which includes removal of sensitive data and IP address anonymization. We arg...
Jelena Mirkovic
MANSCI
2007
100views more  MANSCI 2007»
13 years 8 months ago
Dynamic Assortment with Demand Learning for Seasonal Consumer Goods
Companies such as Zara and World Co. have recently implemented novel product development processes and supply chain architectures enabling them to make more product design and ass...
Felipe Caro, Jérémie Gallien
LPAR
2004
Springer
14 years 2 months ago
Abstraction-Carrying Code
ion-Carrying Code Elvira Albert1 , Germ´an Puebla2 , and Manuel Hermenegildo2,3 1 DSIP, Universidad Complutense Madrid 2 Facultad de Inform´atica, Technical University of Madrid ...
Elvira Albert, Germán Puebla, Manuel V. Her...