Sciweavers

469 search results - page 91 / 94
» On Cipher Design Based on Switchable Controlled Operations
Sort
View
CASES
2004
ACM
13 years 10 months ago
Reducing energy consumption of queries in memory-resident database systems
The tremendous growth of system memories has increased the capacities and capabilities of memory-resident embedded databases, yet current embedded databases need to be tuned in or...
Jayaprakash Pisharath, Alok N. Choudhary, Mahmut T...
CCS
2009
ACM
14 years 7 months ago
Lightweight self-protecting JavaScript
This paper introduces a method to control JavaScript execution. The aim is to prevent or modify inappropriate behaviour caused by e.g. malicious injected scripts or poorly designe...
Phu H. Phung, David Sands, Andrey Chudnov
ISRR
2005
Springer
138views Robotics» more  ISRR 2005»
14 years 3 days ago
One Is Enough!
We postulate that multi-wheel statically-stable mobile robots for operation in human environments are an evolutionarydead end. Robots of this class tall enough to interact meaning...
Tom Lauwers, George Kantor, Ralph L. Hollis
ACMSE
2007
ACM
13 years 10 months ago
Minimizing broadcast latency in ad hoc wireless networks
Network wide broadcasting in ad-hoc wireless networks provides important control and route establishment functionality for a number of unicast and multicast protocols. In broadcas...
Shankar M. Banik, Sridhar Radhakrishnan
SOUPS
2010
ACM
13 years 10 months ago
A closer look at recognition-based graphical passwords on mobile devices
Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...
Paul Dunphy, Andreas P. Heiner, N. Asokan