Sciweavers

3040 search results - page 59 / 608
» Independent Natural Extension
Sort
View
ACSAC
2006
IEEE
14 years 2 months ago
A Module System for Isolating Untrusted Software Extensions
With the recent advent of dynamically extensible software systems, in which software extensions may be dynamically loaded into the address space of a core application to augment i...
Philip W. L. Fong, Simon A. Orr
CL
2010
Springer
13 years 8 months ago
Isolating untrusted software extensions by custom scoping rules
In a modern programming language, scoping rules determine the visibility of names in various regions of a program [15]. In this work, we examine the idea of allowing an applicatio...
Philip W. L. Fong, Simon A. Orr
BMCBI
2005
114views more  BMCBI 2005»
13 years 7 months ago
Extension of Lander-Waterman theory for sequencing filtered DNA libraries
Background: The degree to which conventional DNA sequencing techniques will be successful for highly repetitive genomes is unclear. Investigators are therefore considering various...
Michael C. Wendl, W. Bradley Barbazuk
TROB
2010
142views more  TROB 2010»
13 years 2 months ago
Extension of the Form-Closure Property to Underactuated Hands
The property of form-closure of a grasp, as generally defined in the literature, is based on the assumption that contact points between the hand and the object are fixed in space. ...
Sébastien Krut, Vincent Begoc, Etienne Domb...
CISC
2007
Springer
156views Cryptology» more  CISC 2007»
14 years 2 months ago
Deniable Authentication on the Internet
Deniable authentication is a technique that allows one party to send messages to another while the latter can not prove to a third party the fact of communication. In this paper, w...
Shaoquan Jiang