Sciweavers

615 search results - page 94 / 123
» Frameworks for Securing Limited-Device Applications
Sort
View
ICC
2007
IEEE
170views Communications» more  ICC 2007»
14 years 3 months ago
Evaluating Techniques for Network Layer Independence in Cognitive Networks
— Cognitive networks are the latest progression of cognitive functionality into the networking stack, an effort which began with a layer one and two focus on cognitive radios, an...
Muthukumaran Pitchaimani, Benjamin J. Ewy, Joseph ...
MOBIQUITOUS
2007
IEEE
14 years 3 months ago
Privacy-Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks
— Vehicular ad hoc networks (VANETs) are being advocated for traffic control, accident avoidance, and a variety of other applications. Security is an important concern in VANETs...
Tong Zhou, Romit Roy Choudhury, Peng Ning, Krishne...
OOPSLA
2007
Springer
14 years 2 months ago
Lost in translation: formalizing proposed extensions to c#
Current real-world software applications typically involve heavy use of relational and XML data and their query languages. Unfortunately object-oriented languages and database que...
Gavin M. Bierman, Erik Meijer, Mads Torgersen
AOSD
2004
ACM
14 years 2 months ago
What are the key issues for commercial AOP use: how does AspectWerkz address them?
AspectWerkz is a framework targeted towards dynamic aspectoriented programming (AOP) in commercial applications. Based on our experience designing and supporting AspectWerkz, we h...
Jonas Bonér
ATAL
2004
Springer
14 years 2 months ago
Self-Protected Mobile Agents
In this paper, we present a new solution for the implementation of flexible protection mechanisms in the context of mobile agent systems, where security problems are currently a ...
Joan Ametller, Sergi Robles, Jose A. Ortega-Ruiz