Sciweavers

583 search results - page 55 / 117
» More Reflections on
Sort
View
IJNSEC
2008
150views more  IJNSEC 2008»
13 years 8 months ago
Tamper Resistant Software Through Intent Protection
One approach to protect distributed systems implemented with mobile code is through program obfuscation. Disguising program intent is a form of information hiding that facilitates...
Alec Yasinsac, J. Todd McDonald
JSAC
2008
121views more  JSAC 2008»
13 years 8 months ago
Stochastic analysis of network coding in epidemic routing
Epidemic routing has been proposed to reduce the data transmission delay in disruption tolerant wireless networks, in which data can be replicated along multiple opportunistic path...
Yunfeng Lin, Baochun Li, Ben Liang
HICSS
2007
IEEE
125views Biometrics» more  HICSS 2007»
14 years 3 months ago
The Length of the Product Generation Life Cycle as a Moderator of Innovation Strategy: A Comparative Cross-Industry Study of Ten
This paper aims at exploring the role of the product generation life cycle (PGLC) on differences in innovation strategy among industries in a crossindustry study of ten multinatio...
Frances T. J. M. Fortuin, S. W. F. Omta
ISWC
2006
IEEE
14 years 2 months ago
Experience Map Creation by Virtual WLAN Location Estimation
We propose a non-cumbersome automatic location estimation method based on an easily accessible infrastructure: the 802.11 LAN. The method consists of two phases: a map-preparation...
Kenji Matsuzawa, Kenji Mase, Yasushi Hirano, Shoji...
ICFP
2006
ACM
14 years 8 months ago
Static analysis for syntax objects
We describe an s-expression based syntax-extension framework much like Scheme macros, with a key additional facility: the ability to define static semantics, such as type systems ...
David Fisher, Olin Shivers