Sciweavers

615 search results - page 112 / 123
» Frameworks for Securing Limited-Device Applications
Sort
View
PEPM
2004
ACM
14 years 2 months ago
Program transformations for portable CPU accounting and control in Java
In this paper we introduce a novel scheme for portable CPU accounting and control in Java, which is based on program transformation techniques at the bytecode level and can be use...
Jarle Hulaas, Walter Binder
DSN
2002
IEEE
14 years 1 months ago
Generic Timing Fault Tolerance using a Timely Computing Base
Designing applications with timeliness requirements in environments of uncertain synchrony is known to be a difficult problem. In this paper, we follow the perspective of timing ...
Antonio Casimiro, Paulo Veríssimo
GI
2001
Springer
14 years 1 months ago
Towards a Novel Architecture to Support Universal Location Awareness
—The rapid advances in a wide range of wireless access technologies along with an industry-wide IP-convergence have set up the stage for context-aware computing. The “location...
Amiya Bhattacharya, Abhishek Roy, Sajal K. Das
KDD
2010
ACM
194views Data Mining» more  KDD 2010»
14 years 23 days ago
Versatile publishing for privacy preservation
Motivated by the insufficiency of the existing quasi-identifier/sensitiveattribute (QI-SA) framework on modeling real-world privacy requirements for data publishing, we propose ...
Xin Jin, Mingyang Zhang, Nan Zhang 0004, Gautam Da...
APLAS
2008
ACM
13 years 11 months ago
JavaScript Instrumentation in Practice
JavaScript has been exploited to launch various browser-based attacks. Our previous work proposed a theoretical framework applying policy-based code instrumentation to JavaScript. ...
Haruka Kikuchi, Dachuan Yu, Ajay Chander, Hiroshi ...