Sciweavers

675 search results - page 111 / 135
» Mobilization of software developers: the free software movem...
Sort
View
ATAL
2006
Springer
13 years 10 months ago
SAgent: a security framework for JADE
This paper presents SAgent, a general-purpose mobile agent security framework that is designed to protect the computations of mobile agent applications in potentially hostile envi...
Vandana Gunupudi, Stephen R. Tate
CAV
2009
Springer
150views Hardware» more  CAV 2009»
14 years 9 months ago
Automated Analysis of Java Methods for Confidentiality
We address the problem of analyzing programs such as J2ME midlets for mobile devices, where a central correctness requirement concerns confidentiality of data that the user wants t...
Pavol Cerný, Rajeev Alur
FOSSACS
2010
Springer
14 years 3 months ago
Forward Analysis of Depth-Bounded Processes
Depth-bounded processes form the most expressive known fragment of the π-calculus for which interesting verification problems are still decidable. In this paper we develop an ade...
Thomas Wies, Damien Zufferey, Thomas A. Henzinger
ISCAS
2003
IEEE
156views Hardware» more  ISCAS 2003»
14 years 2 months ago
GNOMES: a testbed for low power heterogeneous wireless sensor networks
Continuing trends in sensor, semiconductor and communication systems technology (smaller, faster, cheaper) make feasible very dense networks of fixed and mobile wireless devices ...
Erik Welsh, Walt Fish, J. Patrick Frantz
ISWC
1999
IEEE
14 years 1 months ago
Situated Documentaries: Embedding Multimedia Presentations in the Real World
We describe an experimental wearable augmented reality system that enables users to experience hypermedia presentations that are integrated with the actual outdoor locations to wh...
Tobias Höllerer, John V. Pavlik, Steven Feine...