Sciweavers

1033 search results - page 151 / 207
» Redistribution in distributed Ada
Sort
View
WMPI
2004
ACM
14 years 3 months ago
The Opie compiler from row-major source to Morton-ordered matrices
The Opie Project aims to develop a compiler to transform C codes written for row-major matrix representation into equivalent codes for Morton-order matrix representation, and to a...
Steven T. Gabriel, David S. Wise
WPES
2004
ACM
14 years 3 months ago
Privacy preserving route planning
The number of location-aware mobile devices has been rising for several years. As this trend continues, these devices may be able to use their location information to provide inte...
Keith B. Frikken, Mikhail J. Atallah
WS
2004
ACM
14 years 3 months ago
A man-in-the-middle attack on UMTS
In this paper we present a man-in-the-middle attack on the Universal Mobile Telecommunication Standard (UMTS), one of the newly emerging 3G mobile technologies. The attack allows ...
Ulrike Meyer, Susanne Wetzel
CCS
2004
ACM
14 years 3 months ago
KNOW Why your access was denied: regulating feedback for usable security
We examine the problem of providing useful feedback about access control decisions to users while controlling the disclosure of the system’s security policies. Relevant feedback...
Apu Kapadia, Geetanjali Sampemane, Roy H. Campbell
CCS
2004
ACM
14 years 3 months ago
On the effectiveness of address-space randomization
Address-space randomization is a technique used to fortify systems against bu er over ow attacks. The idea is to introduce arti cial diversity by randomizing the memory location o...
Hovav Shacham, Matthew Page, Ben Pfaff, Eu-Jin Goh...