Sciweavers

2897 search results - page 479 / 580
» Mobile Code Security
Sort
View
142
Voted
ADHOC
2010
195views more  ADHOC 2010»
15 years 2 months ago
SDRT: A reliable data transport protocol for underwater sensor networks
In this paper, we investigate the reliable data transport problem in underwater sensor networks. Underwater sensor networks are significantly different from terrestrial sensor net...
Peng Xie, Zhong Zhou, Zheng Peng, Jun-Hong Cui, Zh...
108
Voted
ICIP
1994
IEEE
16 years 3 months ago
A Digital Watermark
This paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512*512 intensity image with an 8 bit gray scale. The watermark is capa...
Ron G. van Schyndel, Andrew Z. Tirkel, C. F. Osbor...
ICFP
2009
ACM
16 years 3 months ago
A theory of typed coercions and its applications
A number of important program rewriting scenarios can be recast as type-directed coercion insertion. These range from more theoretical applications such as coercive subtyping and ...
Nikhil Swamy, Michael W. Hicks, Gavin M. Bierman
CODES
2008
IEEE
15 years 8 months ago
Symbolic voter placement for dependability-aware system synthesis
This paper presents a system synthesis approach for dependable embedded systems. The proposed approach significantly extends previous work by automatically inserting fault detect...
Felix Reimann, Michael Glabeta, Martin Lukasiewycz...
NDSS
2007
IEEE
15 years 8 months ago
Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis
Cross-site scripting (XSS) is an attack against web applications in which scripting code is injected into the output of an application that is then sent to a user’s web browser....
Philipp Vogt, Florian Nentwich, Nenad Jovanovic, E...