Sciweavers

2897 search results - page 518 / 580
» Mobile Code Security
Sort
View
DANCE
2002
IEEE
14 years 3 months ago
Active Network Monitoring and Control: The SENCOMM Architecture and Implementation
We present the architecture, design, and implementation of a Smart Environment for Network Control, Monitoring and Management (SENCOMM). SENCOMM uses active network technology to ...
Alden W. Jackson, James P. G. Sterbenz, Matthew Co...
ESOP
2001
Springer
14 years 2 months ago
What Are Polymorphically-Typed Ambients?
The Ambient Calculus was developed by Cardelli and Gordon as a formal framework to study issues of mobility and migrant code [CG98]. We consider an Ambient Calculus where ambients...
Torben Amtoft, A. J. Kfoury, Santiago M. Peric&aac...
IH
2001
Springer
14 years 2 months ago
Computational Forensic Techniques for Intellectual Property Protection
Computational forensic engineering (CFE) aims to identify the entity that created a particular intellectual property (IP). Rather than relying on watermarking content or designs, t...
Jennifer L. Wong, Darko Kirovski, Miodrag Potkonja...
ISRR
2001
Springer
151views Robotics» more  ISRR 2001»
14 years 2 months ago
Advanced Sonar Sensing
Robotics research is dependent on intelligent, fast, accurate, reliable and cheap sensors. Sonar sensing can fulfil these requirements. Moreover sonar physics provides robotics re...
Lindsay Kleeman
TOOLS
2000
IEEE
14 years 2 months ago
Pickling Threads State in the Java System
Today, distributed object-based computing is closely linked with Java. The Java virtual machine is ported to most current operating systems and provides many services which help d...
Sara Bouchenak, Daniel Hagimont