Sciweavers

2612 search results - page 209 / 523
» Mobile Processes and Termination
Sort
View
ITNG
2006
IEEE
14 years 4 months ago
Secure Two-Way Transfer of Measurement Data
We introduce a measurement system architecture, which has three main qualities: secure two-way transfer of measurement data, quick adaptability to different kinds of measurement ...
Marko Hassinen, Maija Marttila-Kontio, Mikko Saesm...
VTS
2006
IEEE
95views Hardware» more  VTS 2006»
14 years 4 months ago
Integrated CMOS Power Sensors for RF BIST Applications
This paper presents the design and experimental results of fully integrated CMOS power sensors for RF built-in self-test (BIST) applications. Using a standard 0.18- m CMOS process...
Hsieh-Hung Hsieh, Liang-Hung Lu
STACS
2005
Springer
14 years 4 months ago
Recursive Markov Chains, Stochastic Grammars, and Monotone Systems of Nonlinear Equations
We introduce and study Recursive Markov Chains (RMCs), which extend ordinary finite state Markov chains with the ability to invoke other Markov chains in a potentially recursive m...
Kousha Etessami, Mihalis Yannakakis
ACNS
2004
Springer
284views Cryptology» more  ACNS 2004»
14 years 4 months ago
SQLrand: Preventing SQL Injection Attacks
We present a practical protection mechanism against SQL injection attacks. Such attacks target databases that are accessible through a web frontend, and take advantage of flaws in...
Stephen W. Boyd, Angelos D. Keromytis
ISW
2004
Springer
14 years 4 months ago
The Obfuscation Executive
Abstract. Code obfuscations are semantics-preserving code transformations used to protect a program from reverse engineering. There is generally no expectation of complete, long-te...
Kelly Heffner, Christian S. Collberg