Sciweavers

1295 search results - page 221 / 259
» Palimpsests of Time and Place
Sort
View
MOBIHOC
2003
ACM
14 years 10 months ago
Mobility helps security in ad hoc networks
Contrary to the common belief that mobility makes security more difficult to achieve, we show that node mobility can, in fact, be useful to provide security in ad hoc networks. We...
Jean-Pierre Hubaux, Levente Buttyán, Srdjan...
PLDI
2010
ACM
14 years 8 months ago
Breadcrumbs: Efficient Context Sensitivity for Dynamic Bug Detection Analyses
Calling context--the set of active methods on the stack--is critical for understanding the dynamic behavior of large programs. Dynamic program analysis tools, however, are almost ...
Michael D. Bond, Graham Z. Baker, Samuel Z. Guyer
POPL
2010
ACM
14 years 8 months ago
Static Determination of Quantitative Resource Usage for Higher-Order Programs
We describe a new automatic static analysis for determining upper-bound functions on the use of quantitative resources for strict, higher-order, polymorphic, recursive programs de...
Steffen Jost, Hans-Wolfgang Loidl, Kevin Hammond, ...
WISEC
2010
ACM
14 years 6 months ago
Providing security with insecure systems
Abstract A Martian who arrived on Earth today would surely conclude that computing and communications security are in a crisis situation. The popular media as well as technical pub...
Andrew M. Odlyzko
CHI
2010
ACM
14 years 5 months ago
An exploratory study of unsupervised mobile learning in rural India
CT Cellphones have the potential to improve education for the millions of underprivileged users in the developing world. However, mobile learning in developing countries remains un...
Anuj Kumar, Anuj Tewari, Geeta Shroff, Deepti Chit...