Sciweavers

804 search results - page 75 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
ASPLOS
2006
ACM
15 years 10 months ago
Architectural support for software-based protection
Control-Flow Integrity (CFI) is a property that guarantees program control flow cannot be subverted by a malicious adversary, even if the adversary has complete control of data m...
Mihai Budiu, Úlfar Erlingsson, Martí...
SIGCOMM
2005
ACM
15 years 10 months ago
Idle sense: an optimal access method for high throughput and fairness in rate diverse wireless LANs
We consider wireless LANs such as IEEE 802.11 operating in the unlicensed radio spectrum. While their nominal bit rates have increased considerably, the MAC layer remains practica...
Martin Heusse, Franck Rousseau, Romaric Guillier, ...
RIDE
1999
IEEE
15 years 9 months ago
Establishing Virtual Enterprises by Means of Mobile Agents
Electronic Commerce is expanding from the simple notion of Electronic Store to the notion of Virtual Enterprises (VE) where existing enterprises dynamically form temporary allianc...
Panos K. Chrysanthis, Sujata Banerjee, Shi-Kuo Cha...
CDC
2008
IEEE
166views Control Systems» more  CDC 2008»
15 years 6 months ago
Distributed coverage verification in sensor networks without location information
In this paper, we present a series of distributed algorithms for coverage verification in sensor networks with no location information. We demonstrate how, in the absence of locali...
Alireza Tahbaz-Salehi, Ali Jadbabaie
AUTOMATICA
2005
86views more  AUTOMATICA 2005»
15 years 4 months ago
Sensitivity shaping with degree constraint by nonlinear least-squares optimization
This paper presents a new approach to shaping of the frequency response of the sensitivity function. In this approach, a desired frequency response is assumed to be specified at a...
Ryozo Nagamune, Anders Blomqvist