Sciweavers

2747 search results - page 394 / 550
» Network externalities in software systems
Sort
View
RAID
2010
Springer
13 years 8 months ago
Automatic Discovery of Parasitic Malware
Malicious software includes functionality designed to block discovery or analysis by defensive utilities. To prevent correct attribution of undesirable behaviors to the malware, it...
Abhinav Srivastava, Jonathon T. Giffin
IAT
2007
IEEE
14 years 4 months ago
Dynamic Data Driven Multi-Agent Simulation
Networks of sensors and simulation models of the physical environment have been implemented separately, often using agent-based methodologies. Some work has been done in providing...
Gary M. Pereira
FSTTCS
2005
Springer
14 years 3 months ago
Non-disclosure for Distributed Mobile Code
Abstract. This paper addresses the issue of confidentiality and declassification for global computing in a language-based security perspective. The purpose is to deal with new fo...
Ana Almeida Matos
ACISP
1998
Springer
14 years 2 months ago
A Solution to Open Standard of PKI
PKI Public Key Infrastructure is fundamental for many security applications on the network. However, there are so many di erent kinds of PKI at current stage and they are not comp...
Qi He, Katia P. Sycara, Zhongmin Su
WOA
2003
13 years 11 months ago
Filling the Gap Between Users and Objects: a Multichannel Interactive Environment
— The design and the implementation of software for mobile computers and for pervasive computing environments entail several issues and lead to new requirements. Applications mus...
Davide Carboni, Andrea Piras, Stefano Sanna, Gavin...