Sciweavers

1011 search results - page 156 / 203
» Implementing Distributed Controllers for Systems with Priori...
Sort
View
DRM
2007
Springer
15 years 8 months ago
Mechanism for software tamper resistance: an application of white-box cryptography
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have full access to the software and full control over it...
Wil Michiels, Paul Gorissen
GRID
2005
Springer
15 years 8 months ago
Protecting grid data transfer services with active network interfaces
A key goal of grid computing is to provide seamless access to shared computational and data resources across organizational boundaries, in distributed virtual organizations. Grid ...
Onur Demir, Michael R. Head, Kanad Ghose, Madhusud...
123
Voted
CW
2005
IEEE
15 years 8 months ago
Agent Models for Dynamic 3D Virtual Worlds
Agents are systems capable of perceiving their environment through sensors, reasoning about their sensory input using some characteristic reasoning process and acting in their env...
Mary Lou Maher, Kathryn Elizabeth Merrick
131
Voted
ICSE
2009
IEEE-ACM
15 years 8 days ago
A non-intrusive component-based approach for deploying unanticipated self-management behaviour
Supporting self-management behaviour by means of component-based architectural solutions has been the focus of many current research projects. In such a context, handling unantici...
Sandro Santos Andrade, Raimundo José de Ara...
92
Voted
IPPS
2007
IEEE
15 years 8 months ago
OS Mechanism for Continuation-based Fine-grained Threads on Dedicated and Commodity Processors
Fine-grained multithreading based on a natural model, such as dataflow model, is promising in achieving high efficiency and high programming productivity. In this paper, we disc...
Shigeru Kusakabe, Satoshi Yamada, Mitsuhiro Aono, ...