Sciweavers

100 search results - page 11 / 20
» Efficient and extensible security enforcement using dynamic ...
Sort
View
CCS
1998
ACM
14 years 4 hour ago
A Specification of Java Loading and Bytecode Verification
This paper gives a mathematical specification the Java Virtual Machine (JVM) bytecode verifier. The specification is an axiomatic description of the verifier that makes precise su...
Allen Goldberg
WICON
2008
13 years 9 months ago
SAMPL: a simple aggregation and message passing layer for sensor networks
In recent years, wireless sensor networking has shown great promise in applications ranging from industrial control, environmental monitoring and inventory tracking. Given the res...
Anthony Rowe, Karthik Lakshmanan, Ragunathan Rajku...
HICSS
2006
IEEE
75views Biometrics» more  HICSS 2006»
14 years 1 months ago
Electronic Markets for Private Information: Economic and Security Considerations
Technological advances in the collection, storage and analysis of data have increased the ease with which businesses can make profitable use of information about individuals. Som...
Ram Gopal L., Robert S. Garfinkel, Manuel A. Nunez...
TISSEC
2008
235views more  TISSEC 2008»
13 years 7 months ago
SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks
Hop-by-hop data aggregation is a very important technique for reducing the communication overhead and energy expenditure of sensor nodes during the process of data collection in a...
Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao
CVPR
2001
IEEE
14 years 9 months ago
Evolving Image Segmentations for the Analysis of Video Sequences
A methodology for the segmentation of successive frames of a video sequence is presented. Traditional methods, treating each frame in isolation, are computationally expensive, ign...
A. A. Clark, Barry T. Thomas