Sciweavers

2897 search results - page 484 / 580
» Mobile Code Security
Sort
View
ICIP
2000
IEEE
16 years 3 months ago
Compression Tolerant Watermarking for Image Verification
Digital Watermarking is seen as a viable solution to authentication of multimedia data and hence its security, especially in a networked environment. In this paper we present a ne...
Harpal S. Bassali, Jatin Chhugani, Saurabh Agarwal...
ICSE
2009
IEEE-ACM
16 years 3 months ago
Modular string-sensitive permission analysis with demand-driven precision
In modern software systems, programs are obtained by dynamically assembling components. This has made it necessary to subject component providers to access-control restrictions. W...
Emmanuel Geay, Marco Pistoia, Takaaki Tateishi, Ba...
213
Voted
POPL
2003
ACM
16 years 2 months ago
Toward a foundational typed assembly language
We present the design of a typed assembly language called TALT that supports heterogeneous tuples, disjoint sums, and a general account of addressing modes. TALT also implements t...
Karl Crary
SEFM
2009
IEEE
15 years 9 months ago
Implementation Correctness of a Real-Time Operating System
—In the modern car, electronic devices are even employed for safety-critical missions like brake control, where failures might cost human lives. Among various approaches to incre...
Matthias Daum, Norbert Schirmer, Mareike Schmidt
96
Voted
PPDP
2009
Springer
15 years 8 months ago
The RPC calculus
Several recent language designs have offered a unified language for programming a distributed system, with explicit notation of locations; we call these “location-aware” lan...
Ezra Cooper, Philip Wadler