Sciweavers

2978 search results - page 590 / 596
» Operations Research
Sort
View
CORR
2010
Springer
155views Education» more  CORR 2010»
14 years 11 months ago
A Proof Theoretic Analysis of Intruder Theories
We consider the problem of intruder deduction in security protocol analysis: that is, deciding whether a given message M can be deduced from a set of messages under the theory of ...
Alwen Tiu, Rajeev Goré, Jeremy E. Dawson
IJESMA
2010
136views more  IJESMA 2010»
14 years 11 months ago
Understanding Shared Services: An Exploration of the IS Literature
In a competitive environment, companies continuously innovate to offer superior services at lower costs. `Shared services' have been extensively adopted in practice as one me...
Suraya Miskon, Wasana Bandara, Erwin Fielt, Guy G....
143
Voted
ACSAC
2010
IEEE
14 years 11 months ago
Heap Taichi: exploiting memory allocation granularity in heap-spraying attacks
Heap spraying is an attack technique commonly used in hijacking browsers to download and execute malicious code. In this attack, attackers first fill a large portion of the victim...
Yu Ding, Tao Wei, Tielei Wang, Zhenkai Liang, Wei ...
CCR
2011
14 years 9 months ago
The politecast communication primitive for low-power wireless
ion can improve performance without significantly breaking layered abstractions; explicit bursts are preferable to steady, constant bitrate traffic. Furthermore, the vagaries and c...
Marcus Lundén, Adam Dunkels
157
Voted
IS
2011
14 years 9 months ago
Optimized query routing trees for wireless sensor networks
In order to process continuous queries over Wireless Sensor Networks (WSNs), sensors are typically organized in a Query Routing Tree (denoted as T) that provides each sensor with ...
Panayiotis Andreou, Demetrios Zeinalipour-Yazti, A...